HSECPresentation Lec2 2022
HSECPresentation Lec2 2022
Topic
Lecture 02: Introduction to Hardware Security (Part 2)
Concepts Covered:
Hardware Attacks
References: https://en.wikipedia.org/wiki/Trusted_Platform_Module#TPM_1.2_vs_TPM_2.0
Hardware Attacks on TPMs
• In 2010, researchers presented an attack against TPM in Black
Hat Conference
• Extract secrets from a single TPM by inserting a probe and spying
on the internal bus of an Infineon SLE 66 CL PC.
• In 2015, reports on Differential Power Analysis (DPA) were
reported to extract the secret keys.
References: https://en.wikipedia.org/wiki/Trusted_Platform_Module#TPM_1.2_vs_TPM_2.0
Hardware Attacks
• Side Channel Attacks: Monitoring of analog
signals, like time, power, Electro-magnetics,
sound, etc.
• Fault Attacks: Physical perturbation of Vcc,
clock, temperature, UV light, X-Rays, Laser
• Invasive Attacks: Probe data, modify circuit!
• Modern Focused Ion Beam (FIB) machines can
create test points and modify the chip structure
from the rear side thus overcoming
sophisticated top metal mesh protections and
sensors
• Expensive but feasible!
References: http://www.cs.unh.edu/~it666/reading_list/Hardware/tpm_fundamentals.pdf
Hardware Security bridges the gap between Theory
and Practice
Message Message
E D
Communication
Ka Channel Kb
leaked
Alice Bob
Information
Side Channels in the real world
Through which a cryptographic module
leaks information to its environment
Mallory unintentionally
Cryptographic Theory has limitations.
There is an absence of theory for the reality!
Even mathematically strong ciphers leak in the real world!
Hardware Security Design Goals
Performance: Security:
Speed, Clock Side Channel Attacks,
Frequency, Latency Fault Attacks
Fast Arithmetic Lightweight
Countermeasures
Cost:
Area, Power,
Energy
Hardware Design Flow on FPGAs
What is an FPGA?
• Field Programmable Gate Arrays.
[Source: http://en.wikipedia.org/wiki/Custom_hardware_attack]
COPACOBANA Components
References:
http://www.copacobana.org/paper/copacobana_gettingstarted.pdf
FPGA Architecture • I/O Block:
• Located around the
periphery of the
core of the chip
• Programmable
Connectivity to the
chip
• Logic Blocks:
• Configurable Logic
Blocks (CLBs)
• Surrounded by
routing logic
• Connected by
switch blocks, or
Switch Block: Connects wires in adjacent channels through
connections blocks
programmable switches
Connection Block: Connects the wire segments around CLBs to its
inputs and outputs also through programmable switches
Components of the CLB
LUT (Look Up Table) for
Combinational Flip-flops/
implementing any function
Logic Latches
with k-inputs (k is 4 or 6)
(Sequential
Logic)
16
Design Flow
Design Entry in schematic, ABEL, VHDL,
and/or Verilog. Vendors include Synopsys,
1
Aldec (Xilinx Foundation), Mentor,
Cadence, Viewlogic, and 35 others.
FPGA
Source: www.digilent.com
A Simple Design Problem
input [1:0] a, b;
output [2:0] s;
assign s = a + b;
endmodule
The Xilinx Design Environment
Device
Specifications
For the Nexys-
III
Board
New Project Wizard
Device Settings
Device
Specifications
For the Nexys-III
Board
Click New Source
Create a Verilog File ‘adder.v’
Click
‘Next’->’Next’
‘adder.v’
module adder(a, b, s);
input [1:0] a, b;
output [2:0] s;
assign s = a + b;
endmodule
Writing Test Bench
• Check with the switch inputs, and see the result on the three LEDs
(correspond with the UCF File)
References:
Debdeep Mukhopadhyay and Rajat Subhra Chakraborty, Hardware Security:
Design, Threats and Safeguards, CRC Press
Conclusion:
TPM a hardware security co-processor to work as a root of
trust
Hardware Attacks are still possible in the form of side
channel attacks
FPGAs provide a reconfigurable platform for hardware
design
FPGA design flow takes the RTL description to the
final prototype in the form of bit-files