Skip to main content

2010 | OriginalPaper | Buchkapitel

3. Hardware Security Challenges

verfasst von : Dr. Ted Huffmire, Dr. Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Dr. Ryan Kastner, Dr. Timothy Sherwood

Erschienen in: Handbook of FPGA Design Security

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter discusses the problem of malicious hardware, or gateware, on FPGAs. Categories of malicious hardware, the problem of foundry trust, and attacks facilitated by malicious inclusions are presented. This chapter also explains the problem of covert channels on FPGAs, with a formal definition of a covert channel in general and a description of the specific case of covert channels on FPGAs. Methods for detecting and mitigating these covert channels are also described.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat O. Aciíçmez, Yet another microarchitectural attack: exploiting I-cache, in Proceedings of the First Computer Security Architecture Workshop (CSAW), Fairfax, VA, November 2007 O. Aciíçmez, Yet another microarchitectural attack: exploiting I-cache, in Proceedings of the First Computer Security Architecture Workshop (CSAW), Fairfax, VA, November 2007
2.
Zurück zum Zitat O. Aciíçmez, S. Gueron, J.P. Seifert, New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures. IACR Cryptology ePrint Archive, Report 039, 2007 O. Aciíçmez, S. Gueron, J.P. Seifert, New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures. IACR Cryptology ePrint Archive, Report 039, 2007
3.
Zurück zum Zitat O. Aciíçmez, J.P. Seifert, Cheap hardware parallelism implies cheap security, in Proceedings of the Fourth Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Vienna, Austria, September 2007 O. Aciíçmez, J.P. Seifert, Cheap hardware parallelism implies cheap security, in Proceedings of the Fourth Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Vienna, Austria, September 2007
4.
Zurück zum Zitat O. Aciíçmez, J.P. Seifert, C.K. Koc, Micro-architectural cryptanalysis. IEEE Secur. Priv. 5(4), 62–64 (2007) CrossRef O. Aciíçmez, J.P. Seifert, C.K. Koc, Micro-architectural cryptanalysis. IEEE Secur. Priv. 5(4), 62–64 (2007) CrossRef
5.
Zurück zum Zitat S. Adee, The hunt for the kill switch. IEEE Spectrum 45(5), 35–39 (2008) S. Adee, The hunt for the kill switch. IEEE Spectrum 45(5), 35–39 (2008)
6.
Zurück zum Zitat R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems (Wiley, New York, 2001) R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems (Wiley, New York, 2001)
7.
Zurück zum Zitat R. Anderson, M. Kuhn, Tamper resistance: a cautionary note, in Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, CA, November 1996 R. Anderson, M. Kuhn, Tamper resistance: a cautionary note, in Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, CA, November 1996
8.
Zurück zum Zitat Z. Chen, P. Schaumont, Slicing up a perfect hardware masking scheme, in Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST-2008), Anaheim, CA, June 2008 Z. Chen, P. Schaumont, Slicing up a perfect hardware masking scheme, in Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST-2008), Anaheim, CA, June 2008
9.
Zurück zum Zitat Defense Science Board, High performance microchip supply. White Paper, February 2005 Defense Science Board, High performance microchip supply. White Paper, February 2005
10.
Zurück zum Zitat K. Gandolfi, C. Mourtel, F. Olivier, Electromagnetic analysis: concrete results, in Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Paris, France, May 2001 K. Gandolfi, C. Mourtel, F. Olivier, Electromagnetic analysis: concrete results, in Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Paris, France, May 2001
11.
Zurück zum Zitat I. Hadzic, S. Udani, J. Smith, FPGA viruses, in Proceedings of the Ninth International Workshop on Field-Programmable Logic and Applications (FPL’99), Glasgow, UK, August 1999 I. Hadzic, S. Udani, J. Smith, FPGA viruses, in Proceedings of the Ninth International Workshop on Field-Programmable Logic and Applications (FPL’99), Glasgow, UK, August 1999
12.
Zurück zum Zitat W.M. Hu, Lattice scheduling and covert channels, in Proceedings of the 1992 IEEE Symposium on Security and Privacy, Oakland, CA, May 1992 W.M. Hu, Lattice scheduling and covert channels, in Proceedings of the 1992 IEEE Symposium on Security and Privacy, Oakland, CA, May 1992
13.
Zurück zum Zitat T. Huffmire, T. Sherwood, R. Kastner, T. Levin, Enforcing memory policy specifications in reconfigurable hardware. Comput. Secur. 27(5–6), 197–215 (2008) CrossRef T. Huffmire, T. Sherwood, R. Kastner, T. Levin, Enforcing memory policy specifications in reconfigurable hardware. Comput. Secur. 27(5–6), 197–215 (2008) CrossRef
14.
Zurück zum Zitat J. Kelsey, B. Schneier, C. Hall, D. Wagner, Side channel cryptanalysis of product ciphers. J. Comput. Secur. 8(2–3), 141–158 (2000) J. Kelsey, B. Schneier, C. Hall, D. Wagner, Side channel cryptanalysis of product ciphers. J. Comput. Secur. 8(2–3), 141–158 (2000)
15.
Zurück zum Zitat R.A. Kemmerer, Shared resource matrix methodology: an approach to identifying storage and timing channels, in ACM Transactions on Computer Systems, 1983 R.A. Kemmerer, Shared resource matrix methodology: an approach to identifying storage and timing channels, in ACM Transactions on Computer Systems, 1983
16.
Zurück zum Zitat R.A. Kemmerer, A practical approach to identifying storage and timing channels: twenty years later, in Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, USA, December 2002 R.A. Kemmerer, A practical approach to identifying storage and timing channels: twenty years later, in Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, USA, December 2002
17.
Zurück zum Zitat S.T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, Y. Zhou, Designing and implementing malicious hardware, in Proceedings of the First Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, April 2008 S.T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, Y. Zhou, Designing and implementing malicious hardware, in Proceedings of the First Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, April 2008
18.
Zurück zum Zitat D. Kirovski, M. Drinic, M. Potkonjak, Enabling trusted software integrity, in Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, CA, October 2002 D. Kirovski, M. Drinic, M. Potkonjak, Enabling trusted software integrity, in Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, CA, October 2002
19.
Zurück zum Zitat P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems, in Proceedings of the 16th Annual International Cryptology Conference (CRYPTO), Santa Barbara, CA, August 1996 P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems, in Proceedings of the 16th Annual International Cryptology Conference (CRYPTO), Santa Barbara, CA, August 1996
20.
Zurück zum Zitat P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference (CRYPTO), Santa Barbara, CA, August 1999 P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference (CRYPTO), Santa Barbara, CA, August 1999
21.
Zurück zum Zitat B.W. Lampson, A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973) CrossRef B.W. Lampson, A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973) CrossRef
22.
Zurück zum Zitat D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, M. Horowitz, Architectural support for copy and tamper resistant software, in Eighth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), San Jose, CA, October 2000 D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, M. Horowitz, Architectural support for copy and tamper resistant software, in Eighth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), San Jose, CA, October 2000
23.
Zurück zum Zitat J.I. Lieberman, National security aspects of the global migration of the US semiconductor industry. White Paper, June 2003 J.I. Lieberman, National security aspects of the global migration of the US semiconductor industry. White Paper, June 2003
24.
Zurück zum Zitat J. Lotspiech, S. Nusser, F. Pestoni, Broadcast encryption’s bright future. IEEE Comput. 35(8), 57–63 (2002) CrossRef J. Lotspiech, S. Nusser, F. Pestoni, Broadcast encryption’s bright future. IEEE Comput. 35(8), 57–63 (2002) CrossRef
25.
Zurück zum Zitat J.P. McGregor, R.P. Lee, Protecting cryptographic keys and computations via virtual secure coprocessing, in Workshop on Architectural Support for Security and Antivirus (WASSA) Held in Conjunction with the Eleventh International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI), Boston, MA, October 2004 J.P. McGregor, R.P. Lee, Protecting cryptographic keys and computations via virtual secure coprocessing, in Workshop on Architectural Support for Security and Antivirus (WASSA) Held in Conjunction with the Eleventh International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI), Boston, MA, October 2004
26.
Zurück zum Zitat J.K. Millen, Covert channel capacity, in Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 1987 J.K. Millen, Covert channel capacity, in Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 1987
27.
Zurück zum Zitat J.K. Millen, Finite-state noiseless covert channels, in Proceedings of the Computer Security Foundations Workshop II, Franconia, NH, USA, June 1989 J.K. Millen, Finite-state noiseless covert channels, in Proceedings of the Computer Security Foundations Workshop II, Franconia, NH, USA, June 1989
28.
Zurück zum Zitat D.A. Osvik, A. Shamir, E. Tromer, Cache attacks and countermeasures: the case of AES (extended version). Technical Report, Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot 76100, Israel, October 2005 D.A. Osvik, A. Shamir, E. Tromer, Cache attacks and countermeasures: the case of AES (extended version). Technical Report, Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot 76100, Israel, October 2005
29.
Zurück zum Zitat D. Page, Theoretical use of cache memory as a cryptanalytic side-channel. Technical Report CSTR-02-003, Department of Computer Science, University of Bristol, June 2002 D. Page, Theoretical use of cache memory as a cryptanalytic side-channel. Technical Report CSTR-02-003, Department of Computer Science, University of Bristol, June 2002
30.
Zurück zum Zitat D. Page, Partitioned cache architecture as a side channel defense mechanism. Cryptology ePrint Archive, Report 2005/280, 2005 D. Page, Partitioned cache architecture as a side channel defense mechanism. Cryptology ePrint Archive, Report 2005/280, 2005
31.
33.
Zurück zum Zitat S.W. Smith, S.H. Weingart, Building a high-performance, programmable secure coprocessor. Comput. Netw. Int. J. Comput. Telecommun. Netw. (Spec. Issue Comput. Netw. Secur.) 31(9), 831–860 (1999) S.W. Smith, S.H. Weingart, Building a high-performance, programmable secure coprocessor. Comput. Netw. Int. J. Comput. Telecommun. Netw. (Spec. Issue Comput. Netw. Secur.) 31(9), 831–860 (1999)
34.
Zurück zum Zitat F. Standaert, L. Oldenzeel, D. Samyde, J. Quisquater, Power analysis of FPGAs: how practical is the attack? Field-Program. Log. Appl. 2778(2003), 701–711 (2003) CrossRef F. Standaert, L. Oldenzeel, D. Samyde, J. Quisquater, Power analysis of FPGAs: how practical is the attack? Field-Program. Log. Appl. 2778(2003), 701–711 (2003) CrossRef
35.
Zurück zum Zitat N. Topham, A. Gonzalez, Randomized cache placement for eliminating conflicts. IEEETC: IEEE Trans. Comput. 48, 185–192 (1999) CrossRef N. Topham, A. Gonzalez, Randomized cache placement for eliminating conflicts. IEEETC: IEEE Trans. Comput. 48, 185–192 (1999) CrossRef
36.
Zurück zum Zitat S. Trimberger, Trusted design in FPGAs, in Proceedings of the 44th Design Automation Conference, San Diego, CA, USA S. Trimberger, Trusted design in FPGAs, in Proceedings of the 44th Design Automation Conference, San Diego, CA, USA
37.
Zurück zum Zitat Z. Wang, R. Lee, New cache designs for thwarting cache-based side channel attacks, in Proceedings of the 34th International Symposium on Computer Architecture (ISCA), San Diego, CA, June 2007 Z. Wang, R. Lee, New cache designs for thwarting cache-based side channel attacks, in Proceedings of the 34th International Symposium on Computer Architecture (ISCA), San Diego, CA, June 2007
38.
Zurück zum Zitat X. Wang, M. Tehranipoor, J. Plusquellic, Detecting malicious inclusions in secure hardware: challenges and solutions, in IEEE Workshop on Hardware Oriented Security and Trust (HOST), Anaheim, CA, June 2008 X. Wang, M. Tehranipoor, J. Plusquellic, Detecting malicious inclusions in secure hardware: challenges and solutions, in IEEE Workshop on Hardware Oriented Security and Trust (HOST), Anaheim, CA, June 2008
39.
Zurück zum Zitat J. Yang, Y. Zhang, L. Gao, Fast secure processor for inhibiting software piracy and tampering, in Proceedings of the Thirty-Sixth International Symposium on Microarchitecture (MICRO-36), San Diego, CA, December 2003 J. Yang, Y. Zhang, L. Gao, Fast secure processor for inhibiting software piracy and tampering, in Proceedings of the Thirty-Sixth International Symposium on Microarchitecture (MICRO-36), San Diego, CA, December 2003
40.
Zurück zum Zitat P. Yu, P. Schaumont, Secure FPGA circuits using controlled placement and routing, in Proceedings of the 2007 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS’07), Salzburg, Austria, October 2007 P. Yu, P. Schaumont, Secure FPGA circuits using controlled placement and routing, in Proceedings of the 2007 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS’07), Salzburg, Austria, October 2007
Metadaten
Titel
Hardware Security Challenges
verfasst von
Dr. Ted Huffmire
Dr. Cynthia Irvine
Thuy D. Nguyen
Timothy Levin
Dr. Ryan Kastner
Dr. Timothy Sherwood
Copyright-Jahr
2010
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-90-481-9157-4_3

Neuer Inhalt