toward threat estimation of system memory hardware trojans
play

Toward threat estimation of system memory Hardware Trojans John - PowerPoint PPT Presentation

UNCLASSIFIED Toward threat estimation of system memory Hardware Trojans John Shield, Brad Hopkins, Chris North Redefining R&D Needs for Australian Cyber Security UNSW ACCS at ADFA, November 16 th 2015 1 UNCLASSIFIED The Australian


  1. UNCLASSIFIED Toward threat estimation of system memory Hardware Trojans John Shield, Brad Hopkins, Chris North Redefining R&D Needs for Australian Cyber Security UNSW ACCS at ADFA, November 16 th 2015 1

  2. UNCLASSIFIED The Australian Perspective  Australia sources all integrated circuits from overseas  Lack of resources for: – designing – fabricating – testing chips  Majority of supply is from non-allied nations Gartner report "Market Share: Semiconductor Foundry, Worldwide, 2014." Vendor Foundry Location 2014 2014 Market Revenue Share (%) TSMC Taiwan 25,175 53.7 UMC Taiwan 4,621 9.9 Globalfoundries U.S. 4,400 9.4 Samsung 1 South Korea 2,412 5.1 SMIC China 1,970 4.2 2

  3. Hardware Trojans  Modifications to Circuit Boards or Integrated Circuits  We Focus on Integrated Circuits – Harder to verify post-production  Modifications Possible – Functional – Parametric  Outcomes – Leak or Modify Information – Reduce Effectiveness • Denial of service, degradation of service, integrity attacks, etc. 3

  4. Memory Protection  Memory Protection is Key to Software Security – Privilege Levels and Data Isolation DRAM MEMORY CPU HARDWARE Redirected Blocked Memory Hardware Trojan access to Access blocked region Software MMU Valid Memory Access Normal Access Memory DRAM Mapping Mapping 4

  5. Memory Trojan – Exemplar Hardware  Interposer Card  Redirects memory accesses 5

  6. Case Study: Cloud Computing  Breaking: Memory Isolation between Virtual Machines  Description: Data modification of corporate email in a corporate VM using an public VM 6

  7. Case Study: Guest Accounts  Breaking: Privileged (kernel) Mode and User Mode  Description: Overwriting a root executable by a guest user to gain root access 7

  8. System Memory Trojan Threat  Threat Level – High Threat: Software security hinges on memory protection  Securing Procurement – Not viable  Defence Mechanisms – None Commercially Available 8

  9. Threat Mitigation Strategy  DST Group – Trustworthy Systems Research – Research: Trustworthy circuit design using untrusted components – Provides Australian defence context and applications – Collaboration: Integrate external S&T and Industry  Academia – Research: Trustworthy software (eg seL4) – Research: Security primitives for hardware & processors  Industry - Partner early for – Technology insertion – Transition into capability 9

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend