Yossi Oren, yos strudel bgu.ac.il, yossioren System Security Engineering course, Dec

Slides:



Advertisements
Similar presentations
Side-Channel Attacks on RSA with CRT Weakness of RSA Alexander Kozak Jared Vanderbeck.
Advertisements

Smart Card security analysis Smart Card security analysis Marc Witteman, TNO.
Differential Fault Analysis on AES Variants Kazuo Sakiyama, Yang Li The University of Electro-Communications Nagoya, Japan.
Information Security – Theory vs. Reality , Winter 2011 Guest Lecturer: Yossi Oren 1.
An Introduction to Stream Ciphers Zahra Ahmadian Electrical Engineering Department Sahrif University of Technology
Is there Safety in Numbers against Side Channel Leakage? Colin D. Walter UMIST, Manchester, UK
Low Cost Attack on Tamper Resistant Devices Ross Anderson, Markus Kuhn Songpol Manoonpong.
Differential Power Analysis of Smartcards How secure is your private information? Author: Ryan Junee Supervisor: Matt Barrie.
Khaled A. Al-Utaibi  Computers are Every Where  What is Computer Engineering?  Design Levels  Computer Engineering Fields  What.
Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity 1.
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.
C ● O ● M ● O ● D ● O RESEARCH LAB Longer Keys may Facilitate Side Channel Attacks (Bradford, UK) Colin.
Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS Singapore.
1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.
Side-Channel Attacks on Smart Cards. Timing Analysis Cryptosystems take different amount of time to process different inputs. Performance optimisations.
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R.
Automatic Application of Power Analysis Countermeasures Ali Galip Bayrak Francesco Regazzoni David Novo Philip Brisk François-Xavier Standaert Paolo Ienne.
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
RRB/STS ORNL Workshop Integrated Hardware/Software Security Support R. R. BrooksSam T. Sander Associate ProfessorAssistant Professor Holcombe Department.
Inferno : Side-channel Attacks for Mobile Web Browsers Manuel Philipose, Matthew Halpern, Pavel Lifshits, Mark Silberstein, Mohit Tiwari Background and.
Template attacks Suresh Chari, Josyula R. Rao, Pankaj Rohatgi IBM Research.
Introduction to Information Technology Chapter 1 Mind Tools for Your Future.
Side Channel Attacks through Acoustic Emanations
CBSSS 2002: DeHon Architecture as Interface André DeHon Friday, June 21, 2002.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
H.M.Gamaarachchi (E/10/102) P.B.H.B.B.Ganegoda (E/10/104)
Advanced Information Security 6 SIDE CHANNEL ATTACKS Dr. Turki F. Al-Somani 2015.
J. Christiansen, CERN - EP/MIC
The EM Side-Channel(s) Dakshi Agrawal Bruce Archambeault Josyula R Rao Pankaj Rohatgi IBM.
CHES 2015 Finding the AES Bits in the Haystack:
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
Possible Testing Solutions and Associated Costs
DPA Countermeasures by Improving the Window Method Kouichi Itoh, Jun Yajima, Masahiko Takenaka and Naoya Torii Workshop on Cryptographic Hardware and Embedded.
Kouichi Itoh, Tetsuya Izu and Masahiko Takenaka Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) August, 2002 Address-bit Differential.
Sliding Windows Succumbs to Big Mac Attack Colin D. Walter
Exploiting Cache-Timing in AES: Attacks and Countermeasures Ivo Pooters March 17, 2008 Seminar Information Security Technology.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
OWASP AppSec Israel, 13/Oct/2015 Yossi Oren, Ben Gurion University Joint work with Vasileios P. Kemerlis,
Power Analysis Attack on the Masking Type Conversion Algorithm Using Exponentiation Young In Cho', Dong-GukHan g, Seokhie Hong', Young-Ho Park a 'LIST.
New Methods for Cost-Effective Side- Channel Attacks on Cryptographic RFIDs Chair for Embedded Security Ruhr University Bochum David Oswald Timo Kasper.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
1 Information Security – Theory vs. Reality , Winter Lecture 3: Power analysis, correlation power analysis Lecturer: Eran Tromer.
WISA 2007 Jeju Island, Korea, 27th – 29th Aug 2007 Longer Randomly Blinded RSA Keys may be Weaker than Shorter Ones Colin D. Walter
RSA Key Extraction via Low- Bandwidth Acoustic Cryptanalysis Daniel Genkin, Adi Shamir, Eran Tromer.
Lecture7 –More on Attacks Rice ELEC 528/ COMP 538 Farinaz Koushanfar Spring 2009.
Simulation and Experimental Verification of Model Based Opto-Electronic Automation Drexel University Department of Electrical and Computer Engineering.
In The Name of Allah Fault attacks on ECC
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Click to edit Present’s Name Three Attacks, Many Process Variations and One Expansive Countermeasure International Workshop on Cybersecurity Darshana Jayasinghe,
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
SUBJECT : DIGITAL ELECTRONICS CLASS : SEM 3(B) TOPIC : INTRODUCTION OF VHDL.
Security of Digital Signatures
Overview on Hardware Security
Advanced Information Security 6 Side Channel Attacks
Automatic Application of Power Analysis Countermeasures
Xin Fang, Pei Luo, Yunsi Fei, and Miriam Leeser
Protect Your Hardware from Hacking and Theft
Computer Maintenance Unit Subtitle: Basic Input/Output System (BIOS)
4. NCdisk SP-based SoC Architecture 5. NCdisk Security Protocol
Architecture & Organization 1
Introduction CSE 1310 – Introduction to Computers and Programming
Aesun Park1 , Kyung-Ah Shim2*, Namhun Koo2, and Dong-Guk Han1
Hardware Masking, Revisited
Architecture & Organization 1
Unknown Input Attacks in the Parallel Setting Improving the Security of the CHES 2012 Leakage Resilient PRF Marcel Medwed François-Xavier Standaert Ventzislav.
امنیت و اعتماد سخت افزاری
Protect Your Hardware from Hacking and Theft
Introduction to Computer Systems
Presentation Outline Introduction to Side Channel Attacks
Calibration and homographies
Presentation transcript:

Yossi Oren, yos strudel bgu.ac.il, yossioren System Security Engineering course, Dec

מאלגוריתם למציאות : התקפות על מימושים של מערכות מאובטחות

3 Input Output Secure Functionality Secret

Output Sound Heat EM Radiation Power Vibration Timing Secure Device Bad Input Errors 4 Secret Input

 A technique that allows attackers to extract information hidden inside a device, by analyzing the physical signals that the device emits as it performs a secure computation 5 From: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Mangard, Oswald and Popp, 2007

6 From: An Introduction to Implementation Attacks and Countermeasures, Thomas Popp, MEMOCODE 2009

7

 Fundamentals  Power/EM attacks  Low Data Complexity  + Research Questions  High Data Complexity  + Research Questions  Architectural Attacks  + Research Questions 8

 2 classes of chips: ASICs and Microcontrollers MicrocontrollerASIC Software-Defined Functionality Fixed (Hardware) Functionality Serial OperationParallel Operation Cheap to UseCheap to Manufacture 9

10

11

⇐ Low Variance High ⇒ Variance ⇐ Low Correlation High ⇒ Correlation 12

 Hamming Weight – amount of bits that are 1  HW(5) = ?  HW(0xE) = ?  Hamming Distance – amount of bits that are different  HW(5,0) = ?  HW(0xE,0xD) = ? 13

 What device are we attacking? (DUT)  What countermeasures does the DUT have?  What secret are we after?  What is our measurement setup?  What sort of access do we have?  How intimate is our physical access?  How much data can we collect?  Is there an offline phase? 14

 Power consumption is variable  Power consumption depends on instruction  Power consumption depends on data  Electromagnetic emanation depends on power consumption 15

q Power consumption V dd GND a q A P1 C1 C2 N1  The power consumption of a CMOS gate depends on the data: q: 0->0 virtually no power cons. q: 1->1 virtually no power cons. q: 0->1 high power cons. (proportional to C2) q: 1->0 high power cons. (proportional to C1)

Source: DPA Book 17

Source: DPA Book 18

Arm Activate Capture Retrieve 19

20

21 From: Introduction to differential power analysis, Kocher, Jaffe, Jun and Rotaghi, J. Cryptogr Eng. (2011) 1: s_0_0_0 +1 s_0_0_1 +1 s_0_0_5 +1 s_0_0_ s_0_0_7 +1 e_s_0_0_p −1 e_s_0_0_n = 4 ;

 Use statistical properties of traces to recover key  Pros:  Very limited reverse engineering  Harder to confuse  Cons:  Large amount of traces  Two main types of DPA:  Difference of means (traditional DPA)  Correlation power analysis (CPA) 22

 We want to discover the correct key value (c k ) and when it is used (c t )  Idea:  On the correct time, the power consumption of all traces is correlated with the correct key  On other times and other keys the traces should show low correlation 23

 Assume plaintext and correct key are known but correct time is unknown  Form hypothesis and test it  Good hypothesis:  Depends on known plaintext  Depends on small amount of key bits  Non-linear – sensitive to small changes  Maps to power consumption using a model 24

 1000 traces, each consisting of 1 million points  Each trace uses a different known plaintext – 1000 plaintexts  1 known key  Hypothesis is vector of 1000 hypothetical power values  Output of warm-up CPA: vector of 1 million correlation values with peak at c t 25

26

 Plaintext is known, but correct key and correct time unknown  Idea: run warm-up CPA many times in parallel  Create many competing hypotheses 27

 1000 traces, each consisting of 1 million points  Each trace uses a different known plaintext – 1000 plaintexts  Key is unknown – 256 guesses for first byte  Hypothesis is matrix of 1000X256 hypothetical power values  Output of full CPA: matrix of 1,000,000X256 correlation values with peak at (c k,c t ) 28

29

 Q1: How can we extract the most information from power traces?  Q2: How can we align different power traces together (in the presence of countermeasures)?  Q3: How can we expand the attacker model?  Simpler equipment  Less physical proximity 30

“attacks that exploit deeper processor ingredients below the trust architecture boundary” 31 From: Yet Another MicroArchitectural Attack: Exploiting I-Cache, Aciicmez, ACM CSAW 2007

Safari Private BrowsingTor Browser 4.5.1

 Q4: Can we break keys with this method?  Q5: Can we scale the measurement into the “open web”? 33

 Join our cyber mailing list: