SPACE | Dec 2016 1
Sec Secure ure Hardware Hardware and Hardware and Hardware- En Enabled abled Security Security: : New Front New Frontiers iers
Swarup Bhunia Professor
Electrical & Computer Engineering
Sec Secure ure Hardware Hardware and Hardware and Hardware- En - - PowerPoint PPT Presentation
SP SPACE ACE 201 2016 Sec Secure ure Hardware Hardware and Hardware and Hardware- En Enabled abled Security Security: : New Front New Frontiers iers Swarup Bhunia Professor Electrical & Computer Engineering SPACE | Dec 2016 1
SPACE | Dec 2016 1
Swarup Bhunia Professor
Electrical & Computer Engineering
Journal of Hardware and Systems Security EICs: S. Bhunia; M.M. Tehranipoor ISSN: 2509-3428 (print version) ISSN: 2509-3436 (electronic version) Journal no. 41635
▶ Highlights new and ground-breaking developments in the field of electronic hardware and systems security ▶ Covers the interaction of hardware and systems, and between hardware and firmware/software, in the context of security and trust ▶ Encompasses security of processor, System-on- Chip (SoC), Field Programmable Gate Arrays (FPGA), analog/mixed-signal electronics and Printed Circuit Board (PCB) ▶ Publishes archival research results focusing on the security of hardware and system security at all levels of abstraction and the supply chain including track and trace technologies across a variety of industries
IEEE IEEE Intl.
Symp. . on
Hardware Hardware Oriented Oriented Security and Trust (HOS Security and Trust (HOST) T) May 1-5, 2017 The Ritz-Carlton McLean, VA, USA
ABSTRACT:November 1, 2016
AsianHOST AsianHOST Conference Conference, , Dec 19 Dec 19-20 20 2016, Taipei, T 2016, Taipei, Taiwan aiwan
“An embedded system is a combination of hardware and software, and perhaps additional electrical or mechanical parts, intended to provide a dedicated function”
General-purpose systems
Embedded systems
“An embedded system is an electronic system that uses a computer chip but is not a desktop, laptop, or server”
5
Services
Things
Cloud Applications Network
“City of Hamburg and CISCO launch plan for smart city of the future”
BBC World News, May 1 2014
Slide courtesy: Dr. Sandip Ray
Product Timeline
Planning
Production
Development
Exploration
3-4 years
< 1 year
Long, complex life cycle Mass produced in same configuration Devices never intended to be connected Machine-to-machine Requires holistic view of device to cloud and the comm. between them
SPACE | Dec 2016 8
Planning Productn. Development Exploratn .
Tape-
1st Silicon
Pre-silicon Post silicon
Security Assessment Security Validation Security Architecture
Threat modeling Security Test plans Architectural FV
Security Validation
Code review RTL Testing RTL FV
Security Validation
Fuzzing, Penetration Testing, Hack-a-thon
SPACE | Dec 2016 9
SPACE | Dec 2016 10
SOC
SPACE | Dec 2016 11
Fab Assembly Wafer test
Customer
IC Design House Design Spec.
PCB & Sys. Int.
Firmware
SPACE | Dec 2016 12
IP Vendor SoC Design House Foundry Deployment SoC Life-Cycle Threats Design /Test Solutions
Trojan-res. design;
trust validation Hardware Obfuscation; Protect IP Eval. Copy, PUF, Low-cost authentication SCA resistant Design; Prevent scan-based attack; variable ECC
DFT 2012, Tcomp 2012, CHES 2009, D&T, 2012, CHES 2011; ASP-DAC 2013, DAC 2013, VTS 2007, DAC 2013, ICCAD 2008, DAC 2014, DAC 2015, TCAD 2009, VTS 2014, VTS 2015, PIEEE 2014, CCS 2016
Spans all stages in IC life cycle
Insert h/w Trojan; hidden backdoor IP piracy (e.g. cloning) Trojan in design (e.g. by tools) Implant Trojan Overproduction & cloning Leak secret info. RE and cloning
SPACE | Dec 2016 13
*Michael Hayden
Bhunia et al. PIEEE, 2014
SPACE | Dec 2016 14
Comb Trojan model
Comb Trojan Example Seq Trojan Example MOLES*: Info Leakage Trojan
*Lin et al, ICCAD 2009
SPACE | Dec 2016 15
Trojan Attac
ks → Requir equires es HW tr HW trust ust verifica erification! tion!
Bugs (Unintentional) Bounded by Spec
Malicious change (Intentional) Unwanted functionality (Unbounded)
SPACE | Dec 2016 16
Side-channel approaches do not require triggering the Trojan to observe its impact at primary input nodes.
SPACE | Dec 2016 17
– Due to process variations, Trojan detection by Fmax or IDDT alone is challenging! – Consider the intrinsic relationship between IDDT and Fmax
HOST 2010 | CCS 2016
SPACE | Dec 2016 18
Image courtesy: Intel
Zheng et al, DAC 2014, TCAD 2015 ALU ALU
Narasimhan et al. HOST 2011
time due to a seq. Trojan!
SPACE | Dec 2016 19
Playstation modchip wiring
PSX DIY Guide
Modchip for XBOX Modchip attack
Remote HW authentication can help detect in-field tampering!
SPACE | Dec 2016 20
JTAG based authen.
Can serve as backbone for IoT authentication!
Trace based authen.
PC B
Promising results w/ commercial PCBs
C1 C2 C3 C4 R1 R2 R3 R4
Ci, Ri
C1 C5 C6 C4 R1 R5 R6 R4
Ci, Ri
t = 0 t = T Time Owner Cloud Server
IoT Device PCB
C1 C2 Cn R1 R2 Rn
PCB
C1 C2 Cn R1 R2 Rn
C1, C5, C6, C4 R1, R2, R3, R4 R1, R5, R6, R4 C1, C2, C3, C4
Used for authen.
C1, C5, C6, C4 C1, C2, C3, C4
signature from each board
─ Exploit path delay variations in PCB! ─ Leverage boundary scan (JTAG) ─ Suitable for remote monitoring & attestation
SPACE | Dec 2016 21
SPACE | Dec 2016 22
Smar Smartness tness at od t odds ds with with test test & sec & security! urity!
SMART makeup mirror Automatically turns on and off when you come in and out of the frame*
www.implehuman.com
4-in-1 Smart Connect™ Cradle ’n Swing - Techno Gray™
www.fisher-price.com/
“… Baby, that’s genius.” “with motion & climate sensors …automatically adjust as you come and go, or as the temp. rises.” CNET Smart Iron ($1400)
www.fisher-price.com/
“… provides real- time guidance.”
SPACE | Dec 2016 23
Crypto HW/SW needs strong security validation!
usage in HW protection – e.g. FPGA bitstream
K1 K2 S0 S1 S3 S2 P1 P2 P3 S4 K3
Hardware Obfuscation, Chakraborty & Bhunia, ICCAD 2008
SPACE | Dec 2016 24
Secure by design, pre-si / post-si / run-time validation!
SM Processor
Design for Security → Trust Validation → Security Monitoring
Bhunia et al., PIEEE 2014
SPACE | Dec 2016 25
How to verify food / medicine you’re taking are authentic?
SPACE | Dec 2016 26
commonly used to accentuate coloration and freshness in vegetables
Picture Credit: Experience Life, NYTimes
SPACE | Dec 2016 27
Collaborative work with Prof. Mandal at Case Western Reserve U., Research Fellow
King's College London
SPACE | Dec 2016 28
NQR database for drugs NQR Console
analyze composition of a drug / food!
Can detect all types of fake drugs and harmful food additives!
IEEE/ACM Trans. on
SPACE | Dec 2016 29