1
Inside Secure Proprietary Information www.insidesecure.com www.insidesecure.com
D&R IP-SOC Days Grenoble - December 2018
Stuart Kincaid Security Architect, Silicon IP
skincaid@insidesecure.com
Secure Device Lifecycle Stuart Kincaid Security Architect, Silicon - - PowerPoint PPT Presentation
Secure Device Lifecycle Stuart Kincaid Security Architect, Silicon IP skincaid@insidesecure.com D&R IP-SOC Days Grenoble - December 2018 www.insidesecure.com www.insidesecure.com Inside Secure Proprietary Information 1 Product
1
Inside Secure Proprietary Information www.insidesecure.com www.insidesecure.com
D&R IP-SOC Days Grenoble - December 2018
skincaid@insidesecure.com
2
Inside Secure Proprietary Information
3
Inside Secure Proprietary Information
4
Inside Secure Proprietary Information
➢ Root Key Material – Device Identity or Hardware Unique Key (HUK) ➢ Debug Authorisation / Authentication Key ➢ Firmware Authentication and Confidentiality Keys
➢ Having a fully open test interface enabling OTP to be programmed is not recommended Unprogrammed devices / wafers could be intercepted, re-purposed, cloned etc ➢ Use a ‘transport key’ in hardware – could be in ROM, RTL or a combination of both ➢ Once initial provisioning is completed, transport key unlock mechanism is locked out ➢ Subsequent access requires knowledge of provisioned key material ➢ Using hard fuses in OTP permanently locks out test access – can be a good option but can also limit the flexibility required to support multi-stage provisioning
5
Inside Secure Proprietary Information
OEM Trusted Environment Untrusted Environment Device Manufacturer Trusted Environment
Wafer Test Chip Test OEM Integration User Perso Field Updates End of Life
6
Inside Secure Proprietary Information
➢ Secure identity and key generation ➢ Traceability ➢ Customisable to fit with each vendor’s specific requirements
SoC Test Facility
SoC Vendor Tester
Encrypted Link
Key Management System
Key records for SoCs SOC DUT BlackBox Server
Key Generation Headend
BlackBox Error log Analysis Server Key records for SOCs
Encrypted Delivery BlackBox Server Status Information Encrypted Delivery
7
Inside Secure Proprietary Information
➢ Device data may be encrypted after generation using a shared provisioning key ➢ The data is then fully encrypted all the way from the Key generation to the DUT, only being decrypted before storage in OTP ➢ Data cannot be ‘spied’ upon in the tester or between the tester and the DUT. ➢ Authenticate the tester to the SOC DUT (& may be vice versa!)
Encrypted data
SoC Test Facility
SoC Vendor Tester
Encrypted Link
Key Management System
Key records for SoCs SOC DUT BlackBox Server
Key Generation Headend
BlackBox Error log Analysis Server Key records for SOCs
Encrypted Delivery BlackBox Server Status Information Encrypted Delivery Decrypted Data
8
Inside Secure Proprietary Information
➢ Requires TRNG to create unique keys ➢ Device must be ‘functional’ ie all FW needs to be available ➢ Will push the provisioning operation further downstream
➢ Requires a ‘provisioning’ key to be present in hardware ➢ Once new material is decrypted & authenticated, they can be programmed into the OTP ➢ Pushes the provisioning operation further downstream
9
Inside Secure Proprietary Information
Enable Features Debug Host App
Enable Debug Untested Si Root Key Material Added Public Key Auth Material added Host Secure boot Material added Disallow Debug Capability Product Developed
10
Inside Secure Proprietary Information
➢ If the OEM has their own keys, these may be added functionally to the OTP
➢ The FW may be bound to the device using keys derived from the assets programmed previously
11
Inside Secure Proprietary Information
➢ Public key (or hash of it) stored in OTP is used to authenticate the image
➢ Manages monotonic counters in OTP to store the image version
➢ The image signing & encryption tool ➢ A secure boot loader library to execute on the host CPU ➢ Multi-stage boot & signature delegation (certificates) support ➢ Customizable schemes to cope with the platform requirements
12
Inside Secure Proprietary Information
13
Inside Secure Proprietary Information
Crypto data plane AES SHA2 RSA ECC TRNG
RAM
CPU CPU CPU CPU / DSP
Secure Asset Store Protected App.
ROM
TLS Secure boot loader Secure Test & Debug Secure boot loader
Flash
Protected Image Secure Storage Platform Control Port
OTP Debug Access JTAG Enable 0 Enable 1 Enable 7
14
Inside Secure Proprietary Information
Wafer (Probe) Test Chip (Final) Test OEM Integration Field Use End-of-Life (EOL) Trusted Untrusted Failure Analysis HUK Chip Debug Authkey
Operating Environment Product Stage OTP Contents
Host FW Key Material OEM Authkey Material OEM Trusted Trusted Application or user Specific Assets Assets Invalidated Assets Invalidated Device can be Securely Booted & Optionally, chip manufacturer Debug
Functional State
Host can be Securely Booted Optionally, OEM Host App Debug Field Functional Product Secured Not Functional Debug Mode Wafer Fab Trusted Blank Initial State
15
Inside Secure Proprietary Information
✓ Match security grade to potential impact of attack ✓ The longer the product lifespan, the higher security it will require ✓ One size does not fit all
✓ Functional testing does not assure security ✓ Penetration testing are long, expensive and has no coverage metrics ✓ Therefore Get market-proven, mature solution
✓ Automatic software upgrade is essential
16
Inside Secure Proprietary Information