首页> 外文会议>IEEE European Test Symposium >The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
【24h】

The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs

机译:外包的风险:第三方IP内核中的隐藏SCA木马破坏了加密IC

获取原文

摘要

Side-channel analysis (SCA) attacks - especially power analysis - are powerful ways to extract the secrets stored in and processed by cryptographic devices. In recent years, researchers have shown interest in utilizing on-chip measurement facilities to perform such SCA attacks remotely. It was shown that simple voltage-monitoring sensors can be constructed from digital elements and put on multi-tenant FPGAs to perform remote attacks on neighbouring cryptographic co-processors. A similar threat is the unsuspecting integration of third-party IP-Cores into an IC design. Even if the function of an acquired IP-Core is not security critical by itself, it may contain an on-chip sensor as a Trojan that can eavesdrop on cryptographic operations across the whole device. In contrast to all FPGA-based investigations reported in the literature so far, we examine the efficiency of such on-chip sensors as a source of information leakage in an ASIC-based case study for the first time. To this end, in addition to a cryptographic core (lightweight block cipher PRESENT) we designed and implemented a voltage-monitoring sensor on an ASIC fabricated by a 40 nm commercial standard cell library. Despite the physical distance between the sensor and the PRESENT core, we show the possibility of fully recovering the secret key of the PRESENT core by processing the sensor's output. Our results imply that the hidden insertion of such a sensor - for example by a malicious third party IP-Core vendor - can endanger the security of embedded systems which deal with sensitive information, even if the device cannot be physically accessed by the adversary.
机译:边信道分析(SCA)攻击(尤其是功率分析)是提取存储在加密设备中并由加密设备处理的机密的有效方法。近年来,研究人员对利用片上测量工具远程执行此类SCA攻击表现出了兴趣。结果表明,可以由数字元件构成简单的电压监控传感器,并将其放在多租户FPGA上,以对相邻的密码协处理器进行远程攻击。类似的威胁是毫无疑问地将第三方IP内核集成到IC设计中。即使获得的IP核的功能本身对安全性不是至关重要,它也可能包含作为木马的片上传感器,可以窃听整个设备上的加密操作。与迄今为止文献中报道的所有基于FPGA的研究相反,我们首次在基于ASIC的案例研究中检验了这种片上传感器作为信息泄漏源的效率。为此,除密码核心(轻量级分组密码PRESENT)外,我们还在由40 nm商业标准单元库制造的ASIC上设计并实现了电压监控传感器。尽管传感器和PRESENT内核之间存在物理距离,但我们展示了通过处理传感器的输出来完全恢复PRESENT内核的密钥的可能性。我们的结果表明,这种传感器的隐式插入(例如由恶意的第三方IP-Core供应商提供)可能危及处理敏感信息的嵌入式系统的安全性,即使对手无法物理访问该设备也是如此。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号