Vineet Kumar Sharma (200601093) Ankit Agrawal...
Transcript of Vineet Kumar Sharma (200601093) Ankit Agrawal...
Vineet Kumar Sharma (200601093)
Ankit Agrawal (200601003)
- A new approach to hardware security analysis- Copy Protection in Modern Microcontrollers
Presentation Flow Why a need of Secure of Microcontrollers ?
Advantage of Secure MCU’s
Secure Microcontroller Architectural Block Diagram
M2M Applications
Features
Use of secure MCU’s for M2M applications
Examples of different Microcontrollers
Why a need of Secure Microcontrollers ?
Each microcontroller executes the algorithm or program uploaded into its memory, Usually is written in Assembler (even if you write the program in C it will be translated into Assembler during compilation); rarely the algorithm is written in Basic or Java.
For evaluation purposes there are reprogrammable versions of microcontrollers, for production in small quantities there are one-time programmable (OTP) versions which is cheaper than reprogrammable one, and for large amount there are factory programmed versions which are very cheap but you have to purchase at least 1000 items.
Differences between microcontrollers with different type of program memory and also advantages and disadvantages of each type.
Secure microcontrollers are designed for security applications (the military, banks, medical service etc.) and used in Smartcards or security modules. They provide different modes of operation, different access levels, encryption of data communication not only outside the chip but also inside it by using bus encryption, signals hiding etc.
Advantage of Secure MCU’s Software Security
Separate Address /Data Bus
Large Non-Volatile Memory
In-System Loading
High Reliability Operation
M2M applications M2M refers to data communications between
machines. M2M system include:
-A device or group of devices capable of replying to requests for data contained within those devices or capable of transmitting data contained within those devices autonomously.-A communications link to connect the device or group of
devices to a computer server or another device.-A software agent, process, or interface by which the data
can be analyzed, reported, and/or acted upon.-Software Intelligence.
General Features low-power, high-performance
Non Volatile EEPROM data Memory
Low Power Idle and Power-down Modes
Compliant with ETSI TS102221 R7 Temperature Range class B ([-40°C;+105°C])
Available in Wafers, Modules, and Industry-standard Packages
Operating Ranges: 1.62V to 5.50V
135 Powerful Instructions (Most Executed in a Single Clock Cycle)
Non Volatile EEPROM Memory
1 to 128-byte Program / Erase
2ms Program / 2ms Erase
500,000 Write/Erase Cycles at a Temperature of 25°C
10 Years Data Retention at a Temperature of 25°C
Enhanced features dedicated to M2M applications
200,000 Write/Erase Cycles minimum at a Temperature from -40°C to +105°C without firmware
10 Years Data Retention at a Temperature from -40°C to +105°C
Security
Dedicated Hardware for Protection Against SPA/DPA Attacks
Advanced Protection Against Physical Attack
Environmental Protection Systems
Voltage Monitor and Frequency Monitor
Secure Memory Management/Access Protection (Supervisor Mode)
Use of secure MCU’s for M2M applications
Tracking and Inventory Management
Telemetry
Payment and Transaction
Monitoring and Alerting
Home Security
Fixed Wireless Terminals
Remote Control
Several projects applications also based on it
AT90M19236RU, AT90M25672RU and AT90M288144RU for cellular Machine-to-Machine (M2M) communications modules introduced by ATMEL target 32K, 64K and 128K segments respectively.
AT90M available in DFN8 and QFN44 packages,
-low-power, high-performance
-8/16-bit microcontroller
- ROM program memory, EEPROM data memory
-executing powerful instructions in a single clock cycle
-throughputs close to 1 MIPS per MHz
-32 general purpose working registers directly connected to the ALU, allowing two independent registers to be accessed in one single instruction executed in one clock cycle.
-allows the linear addressing of up to 8M bytes of code and up to 16M bytes of data as well as a number of new functional and security features.
-high-performance EEPROM (fast erase/write time, high endurance).
-Additional security features include logical scrambling on program data and addresses, power analysis countermeasures, and memory accesses controlled by a supervisor mode.
AT90M25672RU :
uses GSM/UMTS networks to provide wireless connectivity to range of equipment that communicate without human intervention.
8-/16-bit RISC core,
allowing single cycle instruction execution,
72 KB EEPROM data memory, 6 KB RAM, and 256 KB ROM program memory.
guarantees to withstand extreme environmental conditions such as temperature, humidity or vibrations.
Packages 44-pad QFN, 8-pad DFN RoHS and Green Package
Peripherals 1 ISO 7816 Controller Two 16-bit Timers Random Number Generator (RNG) 2-level Interrupt Controller Hardware DES and Triple DES Checksum Accelerator CRC 16 / 32 Engine (compliant with ISO/IEC 3309)
Development Tools Voyager Emulation Platform (ATV4) to Support Software Development IAR Embedded Workbench® V4.xx Debugger Software Libraries and Application Notes
AC/DC Characteristics Vcc : 1.62V-5.5V Supply Voltage class A-B-C compliant External Clock frequency (Fclk) from 1 to 6 MHz VIH (Input High Voltage), VIL (Input Low Voltage), IIH (Leakage High Current),
IIL (Leakage Low Current), VOH (Output Low Voltage), TR (I/O Output Rise Time), TF (I/O Output Fall Time) compliant with GSM specification (TS102221 V07 -Chapter “Electrical specifications of the UICC - Terminal Interface)
Infineon Technologies launched security microcontrollers for Machine-to-machine (M2M)
applications range from utility monitoring; remote alarm systems; car telematics (for communication between car makers and owners to signify that an oil change or software updates are required); fleet management in freight forwarding and rental car companies; to vending machines (stocks level checks).
SLM 76 family :
very robust and reliable,
capable of storing data for long time (for a decade)
16 million write-and-erase operations at temperatures from -40 °C to +105 °C(more than today’s range -25 °C to +85 °C for SIM applications) even in harsh environment(telematics application).
fulfill the tough requirements for high data retention within a broad temperature range even in rough environments such as humidity, as typical in vehicles and industrial units, and vibrations, which occasionally can be extreme in vehicles,
also responsible for the connection and authentication to the mobile network. This allows the secureexchange of information between the background infrastructure, such as the utility company, and the local equipment, such as an utility meter.
Available as SLM 76 chips in conventional chip card modules and as SMDs (surface mounted device) in 8-pin VQFN (very thin profile quad flat non-leaded) packages for attaching to equipment and machinery applications automatically, and reducing the overall solution cost.
STMicroelectronics Announces ST21F384 Secure Microcontroller with Embedded Flash
Embedded Flash memory (first in the world) to be produced using 90nm (90 nanometer) process technology.
ST21F384
– the first secure micro within ST’s established ST21 smartcard platform, optimized for 2.5G and 3G mobile communications –
-uses Flash memory in place of mask ROM for its program memory,
-to provide increased flexibility and shorter lead times for manufacturers, coupled with increased cost-efficiency from its 90nm production.
-8/16-bit CPU core with 16-Mbyte linear addressing range, running typically at 21MHz.
-It embeds 7 Kbytes of user RAM, plus 384 Kbytes of Flash memory, organized as 128-byte pages, with an erase capability similar to that of the EEPROM
-includes a hardware DES (Data Encryption Standard) accelerator and a user-accessible CRC (Cyclic Redundancy Code) calculation block.
List of Abbreviations GSM – Global System for Mobile Communication
USIM – Universal Subscriber Identity Module
UMTS - Universal Mobile Telecommunication System
SPA/DPA – Simple/Differential Power Analysis
Definitions An SPA attack is a side channel attack in which an
attacker infers the secret information by using power consumption as leaked data
A DPA attack is a side channel attack in which an attacker infers the secret information by using statistical analysis of power consumption.
References http://www.eeglossary.com/m2m.htm
http://news.thomasnet.com/fullstory/553978
http://en.wikipedia.org/wiki/Machine_to_Machine
http://www.atmel.com/dyn/resources/prod_documents/6559DS.pdf
http://72.14.235.132/search?q=cache:59mCDjE60LwJ:www.aymanbahaa.com/projects%25202008.pdf+use+o
f+secure+microcontrollers+for+M2M+applications&cd=16&hl=en&ct=clnk
http://en.wikipedia.org/wiki/Machine_to_Machine
Ross J. Anderson, Markus G. Kuhn: Tamper Resistance - a Cautionary Note, The Second USENIX Workshop
on Electronic Commerce, Oakland, California, November 18-21, 1996
Ross J. Anderson, Markus G. Kuhn: Low Cost Attacks on Tamper Resistant Devices, in M.Lomas et al. (ed.),
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997
Oliver Kmmerling, Markus G. Kuhn: Design Principles for Tamper-Resistant Smartcard Processors, USENIX
Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10-11, 1999