TARDIS Implementing Secure Protocols on Embedded Devices without - - PowerPoint PPT Presentation

tardis
SMART_READER_LITE
LIVE PREVIEW

TARDIS Implementing Secure Protocols on Embedded Devices without - - PowerPoint PPT Presentation

TARDIS Implementing Secure Protocols on Embedded Devices without Clocks Amir Rahmati , Mastooreh Salajegheh, Dan Holcomb 1 , Jacob Sorber 2 , Wayne Burleson, Kevin Fu 1 UC Berkeley 2 Dartmouth Collage The Problem Slow Brute Force attacks on


slide-1
SLIDE 1

TARDIS

Implementing Secure Protocols on Embedded Devices without Clocks

Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb1, Jacob Sorber2, Wayne Burleson, Kevin Fu

1 UC Berkeley 2 Dartmouth Collage

slide-2
SLIDE 2

The Problem

Slow Brute Force attacks on batteryless devices

Garcia et al., Oakland’09 Kasper et al., ISSE’11

E-Passports Smartcards

Amir Rahmati - TARDIS

slide-3
SLIDE 3

Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q

Clocks Need Power

No Notion of Time No knowledge about the query rate

1 Second? 1 Year?

Amir Rahmati - TARDIS

slide-4
SLIDE 4

1 1 1 1 1 x x x x x 1 1 1

Our Solution

Use decay in SRAM to derive a notion of time

Halderman et al., Cold boot attacks, USENIX Sec’08 Gutmann, Secure deletion, USENIX Sec’96

Amir Rahmati - TARDIS

slide-5
SLIDE 5

Stage 3 Stage 1 Stage 2 % Memory Decay Time Without Power 50 t1 t2 TARDIS gives 1 bit of info TARDIS gives 1 bit of info TARDIS estimates time Query Refused Query Accepted

How it works

Three Stages of Decay

Factors affecting stage lengths:

  • Circuit specifications
  • Capacitance
  • Temperature

Stages can range from seconds to hours What about a thermal attacks?

Amir Rahmati - TARDIS

slide-6
SLIDE 6

TARDIS: Time And

Remanence Decay In SRAM

Materializing in USENIX Security 2012 https://spqr.cs.umass.edu/tardis/

time

Holcomb RFID Sec’07, IEEE Trans’09