SoC, why should we care about Fault Injection Attacks ? Guillaume - - PowerPoint PPT Presentation

soc why should we care about fault injection attacks
SMART_READER_LITE
LIVE PREVIEW

SoC, why should we care about Fault Injection Attacks ? Guillaume - - PowerPoint PPT Presentation

SoC, why should we care about Fault Injection Attacks ? Guillaume BOUFFARD ( guillaume.boufgard@ssi.gouv.fr ) David EL-BAZE ( david.elbaze@ssi.gouv.fr ) with the help of Thomas TROUCHKINE Agence nationale de la scurit des systmes


slide-1
SLIDE 1

SoC, why should we care about Fault Injection Attacks ?

Guillaume BOUFFARD (guillaume.boufgard@ssi.gouv.fr) David EL-BAZE (david.elbaze@ssi.gouv.fr) with the help of Thomas TROUCHKINE Agence nationale de la sécurité des systèmes d’information

Journée JAIF – PARIS – 29 Mai 2018

slide-2
SLIDE 2

ANSSI? Késako?

ANSSI (French Network and Information Security Agency) has InfoSec (and no Intelligence) missions: detect and early react to cyber attacks, prevent threats by supporting the development of trusted products and services, provide reliable advice and support and communicate on information security threats and the related means of protection. These missions concern: governmental entities, companies and the general public.

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 1 / 14

slide-3
SLIDE 3

From the SE to the SoC

Sensitive assets are in and computed on the Secure Element (SE). Secure Element are designed to be tamper-resistant against physical and sofuware attacks. System on Chips (SoC) are everywhere:

◮ Automotive ◮ Smartphone ◮ IoT

Secure Element are limited resources devices. For sensitive operations where more resources are required, SoCs are used.

What about security of the SoC?

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 2 / 14

slide-4
SLIDE 4

From the SE to the SoC

Sensitive assets are in and computed on the Secure Element (SE). Secure Element are designed to be tamper-resistant against physical and sofuware attacks. System on Chips (SoC) are everywhere:

◮ Automotive ◮ Smartphone ◮ IoT

Secure Element are limited resources devices. For sensitive operations where more resources are required, SoCs are used.

What about security of the SoC?

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 2 / 14

slide-5
SLIDE 5

What’s a System On Chip (SoC) ? SoC µControllers µProcessors DSPs Memories Timing sources Timers I/O ADCs/DACs Voltage regulators/PMICs Communication BUS FPGA

Why ? Less space needed Low power consumption No data storage → Package On Package

Stacked RAM SoC BGA Wirebounds mini PCB Package

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 3 / 14

slide-6
SLIDE 6

SoC Manufacturers

MSM & APQ (Snapdragon) by Qualcomm Exynos by Samsung MT & Helio by MediaTek Apple A by Apple Tegra by Nvidia Atom by Intel (x86) RK by Fuzhou RockChip Kirin by Hisilicon OMAP by Texas Instrument AML by Amlogic G-series by AMD Allwinner A by Allwinner

91.7 % ARM 8.3 % x86

SoC architectures distribution

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 4 / 14

slide-7
SLIDE 7

Sofuware-security oriented component

(Source: https://developer.arm.com/technologies/trustzone) SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 5 / 14

slide-8
SLIDE 8

Sofuware Impacts

(Source: https://developer.arm.com/technologies/trustzone)

The secure enclave runs trusted apps Rich OS is complex and might have vulnerabilities

Rich OS integrity is ensured by the secure boot step. Rich OS might be jailbreaked (like iOS and Android).

Rich OS might break the security of secure enclave area.

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 6 / 14

slide-9
SLIDE 9

Sofuware Impacts

(Source: https://developer.arm.com/technologies/trustzone)

The secure enclave runs trusted apps Rich OS is complex and might have vulnerabilities

Rich OS integrity is ensured by the secure boot step. Rich OS might be jailbreaked (like iOS and Android).

Rich OS might break the security of secure enclave area.

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 6 / 14

slide-10
SLIDE 10

Sofuware Impacts

(Source: https://developer.arm.com/technologies/trustzone)

The secure enclave runs trusted apps Rich OS is complex and might have vulnerabilities

◮ Rich OS integrity is ensured by the

secure boot step. Rich OS might be jailbreaked (like iOS and Android).

Rich OS might break the security of secure enclave area.

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 6 / 14

slide-11
SLIDE 11

Sofuware Impacts

(Source: https://developer.arm.com/technologies/trustzone)

The secure enclave runs trusted apps Rich OS is complex and might have vulnerabilities

◮ Rich OS integrity is ensured by the

secure boot step.

◮ Rich OS might be jailbreaked (like

iOS and Android).

Rich OS might break the security of secure enclave area.

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 6 / 14

slide-12
SLIDE 12

Sofuware Impacts

(Source: https://developer.arm.com/technologies/trustzone)

The secure enclave runs trusted apps Rich OS is complex and might have vulnerabilities

◮ Rich OS integrity is ensured by the

secure boot step.

◮ Rich OS might be jailbreaked (like

iOS and Android).

Rich OS might break the security of secure enclave area.

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 6 / 14

slide-13
SLIDE 13

State-of-the-art physical attacks

Injection medium Physical target Sofuware target Sofuware security Sofuware Glitch voltage Laser EM BBI UV RAM Clock Register Bus Cache MMU Pipeline Virtual to physical translation table Key Instruction Return value Program counter User rights Memory partitioning Cryptography Secure boot Execution flow integry

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 7 / 14

slide-14
SLIDE 14

State-of-the-art physical attacks

Injection medium Physical target Sofuware target Sofuware security Sofuware Glitch voltage Laser EM BBI UV RAM Clock Register Bus Cache MMU Pipeline Virtual to physical translation table Key Instruction Return value Program counter User rights Memory partitioning Cryptography Secure boot Execution flow integry Project Zero attack/Drammer (2015 - 2016) [Vee+16]

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 7 / 14

slide-15
SLIDE 15

State-of-the-art physical attacks

Injection medium Physical target Sofuware target Sofuware security Sofuware Glitch voltage Laser EM BBI UV RAM Clock Register Bus Cache MMU Pipeline Virtual to physical translation table Key Instruction Return value Program counter User rights Memory partitioning Cryptography Secure boot Execution flow integry Project Zero NaCl/Rowhammer on TrustZone (2015) [Car17]

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 7 / 14

slide-16
SLIDE 16

State-of-the-art physical attacks

Injection medium Physical target Sofuware target Sofuware security Sofuware Glitch voltage Laser EM BBI UV RAM Clock Register Bus Cache MMU Pipeline Virtual to physical translation table Key Instruction Return value Program counter User rights Memory partitioning Cryptography Secure boot Execution flow integry ClkScrew (2017) [TSS17]

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 7 / 14

slide-17
SLIDE 17

State-of-the-art physical attacks

Injection medium Physical target Sofuware target Sofuware security Sofuware Glitch voltage Laser EM BBI UV RAM Clock Register Bus Cache MMU Pipeline Virtual to physical translation table Key Instruction Return value Program counter User rights Memory partitioning Cryptography Secure boot Execution flow integry ? Controlling PC on ARM (2016) [TSW16]

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 7 / 14

slide-18
SLIDE 18

State-of-the-art physical attacks

Injection medium Physical target Sofuware target Sofuware security Sofuware Glitch voltage Laser EM BBI UV RAM Clock Register Bus Cache MMU Pipeline Virtual to physical translation table Key Instruction Return value Program counter User rights Memory partitioning Cryptography Secure boot Execution flow integry Attack on PS3

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 7 / 14

slide-19
SLIDE 19

State-of-the-art physical attacks

Injection medium Physical target Sofuware target Sofuware security Sofuware Glitch voltage Laser EM BBI UV RAM Clock Register Bus Cache MMU Pipeline Virtual to physical translation table Key Instruction Return value Program counter User rights Memory partitioning Cryptography Secure boot Execution flow integry Attack on Xbox 360 (2015) [Bla15]

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 7 / 14

slide-20
SLIDE 20

State-of-the-art physical attacks

Injection medium Physical target Sofuware target Sofuware security Sofuware Glitch voltage Laser EM BBI UV RAM Clock Register Bus Cache MMU Pipeline Virtual to physical translation table Key Instruction Return value Program counter User rights Memory partitioning Cryptography Secure boot Execution flow integry Laser induced fault on smartphone (2017) [Vas+17]

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 7 / 14

slide-21
SLIDE 21

Hardware Impacts

Cons points for security : Many new components inside the SoC can be targeted :

◮ Crypto accelerators, ◮ TRNG, ◮ Memories, ◮ Schedulers, ◮ Timers, ◮ USB controllers, ◮ Radio controllers...

Substrate thickness Crypto accelerators may be protected against FI, but what about the rest ? Security still have to be a global thing !

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 8 / 14

slide-22
SLIDE 22

Hardware Impacts

Pro points for security : big chips with lot of embedded components → not easy to scan (and to find PoI) with classic EM, Laser or BBI attacks, stacked chips → complicates the use of conventional ways of injecting faults (Laser two-photons technology ?), High operating frequency → not easy to sync an attack. Stacked RAM SoC BGA Wirebounds mini PCB Package

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 9 / 14

slide-23
SLIDE 23

Mixed Attacks Side Channel

Cache Attacks, Spectre 1 & 2, Spectre 3 (Meltdown), Spectre 4 (Speculative Store Bypass).

Fault Injection

Clkscrew Rowhammer, Nethammer ...

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 10 / 14

slide-24
SLIDE 24

ClkScrew Clkscrew

DVFS means Dynamic Voltage and Frequency Scaling. It allows a sofuware to change power and frequency parameters. With a corrupted sofuware, you can put the chip into operating borders.

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 11 / 14

slide-25
SLIDE 25

To Conclude

SoCs are widely deployed. SoCs are more and more used to compute sensitive operations. SoCs are complex devices with a large attack area. Can the SoC security level be proved? Thomas TROUCHKINE’s PhD thesis on SoC security against physical attacks in progress.

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 12 / 14

slide-26
SLIDE 26

Questions?

Guillaume BOUFFARD David EL BAZE <guillaume.boufgard@ssi.gouv.fr> <david.elbaze@ssi.gouv.fr>

slide-27
SLIDE 27

References

[Bla15]

  • BlackHat. “XBOX 360 Glitching on fault attack”. Nov. 2015.

[Car17] Pierre Carru. “Attack TrustZone with Rowhammer”. In: GreHack (2017). [TSS17] Adrian Tang, Simha Sethumadhavan, and Salvatore Stolfo. CLKSCREW: Exposing the perils of security-oblivious energy

  • management. Tech. rep. Columbia University, 2017.

[TSW16] Niek Timmers, Albert Spruyt, and Marc Witteman. “Controlling PC on ARM Using Fault Injection”. In: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016, Santa Barbara, CA, USA, August 16, 2016. IEEE Computer Society, 2016, pp. 25–35. DOI: 10.1109/FDTC.2016.18. [Vas+17] Aurélien Vasselle et al. “Laser-induced fault injection on smartphone bypassing the secure boot”. In: (Sept. 2017).

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 13 / 14

slide-28
SLIDE 28

References (cont.)

[Vee+16] Victor van der Veen et al. “Drammer: Deterministic Rowhammer Attacks on Mobile Platforms”. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. Ed. by Edgar R. Weippl et al. ACM, 2016,

  • pp. 1675–1689. DOI: 10.1145/2976749.2978406.

SoC, why should we care about Fault Injection Attacks ?

  • G. BOUFFARD, D. EL BAZE

Journée JAIF 14 / 14