Vineet Kumar Sharma (200601093) Ankit Agrawal...

26
Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003) - A new approach to hardware security analysis - Copy Protection in Modern Microcontrollers

Transcript of Vineet Kumar Sharma (200601093) Ankit Agrawal...

Page 1: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Vineet Kumar Sharma (200601093)

Ankit Agrawal (200601003)

- A new approach to hardware security analysis- Copy Protection in Modern Microcontrollers

Page 2: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Presentation Flow Why a need of Secure of Microcontrollers ?

Advantage of Secure MCU’s

Secure Microcontroller Architectural Block Diagram

M2M Applications

Features

Use of secure MCU’s for M2M applications

Examples of different Microcontrollers

Page 3: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Why a need of Secure Microcontrollers ?

Each microcontroller executes the algorithm or program uploaded into its memory, Usually is written in Assembler (even if you write the program in C it will be translated into Assembler during compilation); rarely the algorithm is written in Basic or Java.

For evaluation purposes there are reprogrammable versions of microcontrollers, for production in small quantities there are one-time programmable (OTP) versions which is cheaper than reprogrammable one, and for large amount there are factory programmed versions which are very cheap but you have to purchase at least 1000 items.

Page 4: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Differences between microcontrollers with different type of program memory and also advantages and disadvantages of each type.

Page 5: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Secure microcontrollers are designed for security applications (the military, banks, medical service etc.) and used in Smartcards or security modules. They provide different modes of operation, different access levels, encryption of data communication not only outside the chip but also inside it by using bus encryption, signals hiding etc.

Page 6: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Advantage of Secure MCU’s Software Security

Separate Address /Data Bus

Large Non-Volatile Memory

In-System Loading

High Reliability Operation

Page 7: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware
Page 8: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

M2M applications M2M refers to data communications between

machines. M2M system include:

-A device or group of devices capable of replying to requests for data contained within those devices or capable of transmitting data contained within those devices autonomously.-A communications link to connect the device or group of

devices to a computer server or another device.-A software agent, process, or interface by which the data

can be analyzed, reported, and/or acted upon.-Software Intelligence.

Page 9: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware
Page 10: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

General Features low-power, high-performance

Non Volatile EEPROM data Memory

Low Power Idle and Power-down Modes

Compliant with ETSI TS102221 R7 Temperature Range class B ([-40°C;+105°C])

Available in Wafers, Modules, and Industry-standard Packages

Operating Ranges: 1.62V to 5.50V

135 Powerful Instructions (Most Executed in a Single Clock Cycle)

Page 11: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Non Volatile EEPROM Memory

1 to 128-byte Program / Erase

2ms Program / 2ms Erase

500,000 Write/Erase Cycles at a Temperature of 25°C

10 Years Data Retention at a Temperature of 25°C

Page 12: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Enhanced features dedicated to M2M applications

200,000 Write/Erase Cycles minimum at a Temperature from -40°C to +105°C without firmware

10 Years Data Retention at a Temperature from -40°C to +105°C

Page 13: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Security

Dedicated Hardware for Protection Against SPA/DPA Attacks

Advanced Protection Against Physical Attack

Environmental Protection Systems

Voltage Monitor and Frequency Monitor

Secure Memory Management/Access Protection (Supervisor Mode)

Page 14: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Use of secure MCU’s for M2M applications

Tracking and Inventory Management

Telemetry

Payment and Transaction

Monitoring and Alerting

Home Security

Fixed Wireless Terminals

Remote Control

Several projects applications also based on it

Page 15: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

AT90M19236RU, AT90M25672RU and AT90M288144RU for cellular Machine-to-Machine (M2M) communications modules introduced by ATMEL target 32K, 64K and 128K segments respectively.

AT90M available in DFN8 and QFN44 packages,

-low-power, high-performance

-8/16-bit microcontroller

- ROM program memory, EEPROM data memory

-executing powerful instructions in a single clock cycle

-throughputs close to 1 MIPS per MHz

-32 general purpose working registers directly connected to the ALU, allowing two independent registers to be accessed in one single instruction executed in one clock cycle.

-allows the linear addressing of up to 8M bytes of code and up to 16M bytes of data as well as a number of new functional and security features.

-high-performance EEPROM (fast erase/write time, high endurance).

-Additional security features include logical scrambling on program data and addresses, power analysis countermeasures, and memory accesses controlled by a supervisor mode.

AT90M25672RU :

uses GSM/UMTS networks to provide wireless connectivity to range of equipment that communicate without human intervention.

8-/16-bit RISC core,

allowing single cycle instruction execution,

72 KB EEPROM data memory, 6 KB RAM, and 256 KB ROM program memory.

guarantees to withstand extreme environmental conditions such as temperature, humidity or vibrations.

Page 16: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware
Page 17: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Packages 44-pad QFN, 8-pad DFN RoHS and Green Package

Peripherals 1 ISO 7816 Controller Two 16-bit Timers Random Number Generator (RNG) 2-level Interrupt Controller Hardware DES and Triple DES Checksum Accelerator CRC 16 / 32 Engine (compliant with ISO/IEC 3309)

Development Tools Voyager Emulation Platform (ATV4) to Support Software Development IAR Embedded Workbench® V4.xx Debugger Software Libraries and Application Notes

Page 18: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

AC/DC Characteristics Vcc : 1.62V-5.5V Supply Voltage class A-B-C compliant External Clock frequency (Fclk) from 1 to 6 MHz VIH (Input High Voltage), VIL (Input Low Voltage), IIH (Leakage High Current),

IIL (Leakage Low Current), VOH (Output Low Voltage), TR (I/O Output Rise Time), TF (I/O Output Fall Time) compliant with GSM specification (TS102221 V07 -Chapter “Electrical specifications of the UICC - Terminal Interface)

Page 19: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware
Page 20: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware
Page 21: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware
Page 22: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Infineon Technologies launched security microcontrollers for Machine-to-machine (M2M)

applications range from utility monitoring; remote alarm systems; car telematics (for communication between car makers and owners to signify that an oil change or software updates are required); fleet management in freight forwarding and rental car companies; to vending machines (stocks level checks).

SLM 76 family :

very robust and reliable,

capable of storing data for long time (for a decade)

16 million write-and-erase operations at temperatures from -40 °C to +105 °C(more than today’s range -25 °C to +85 °C for SIM applications) even in harsh environment(telematics application).

fulfill the tough requirements for high data retention within a broad temperature range even in rough environments such as humidity, as typical in vehicles and industrial units, and vibrations, which occasionally can be extreme in vehicles,

also responsible for the connection and authentication to the mobile network. This allows the secureexchange of information between the background infrastructure, such as the utility company, and the local equipment, such as an utility meter.

Available as SLM 76 chips in conventional chip card modules and as SMDs (surface mounted device) in 8-pin VQFN (very thin profile quad flat non-leaded) packages for attaching to equipment and machinery applications automatically, and reducing the overall solution cost.

Page 23: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

STMicroelectronics Announces ST21F384 Secure Microcontroller with Embedded Flash

Embedded Flash memory (first in the world) to be produced using 90nm (90 nanometer) process technology.

ST21F384

– the first secure micro within ST’s established ST21 smartcard platform, optimized for 2.5G and 3G mobile communications –

-uses Flash memory in place of mask ROM for its program memory,

-to provide increased flexibility and shorter lead times for manufacturers, coupled with increased cost-efficiency from its 90nm production.

-8/16-bit CPU core with 16-Mbyte linear addressing range, running typically at 21MHz.

-It embeds 7 Kbytes of user RAM, plus 384 Kbytes of Flash memory, organized as 128-byte pages, with an erase capability similar to that of the EEPROM

-includes a hardware DES (Data Encryption Standard) accelerator and a user-accessible CRC (Cyclic Redundancy Code) calculation block.

Page 24: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

List of Abbreviations GSM – Global System for Mobile Communication

USIM – Universal Subscriber Identity Module

UMTS - Universal Mobile Telecommunication System

SPA/DPA – Simple/Differential Power Analysis

Page 25: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

Definitions An SPA attack is a side channel attack in which an

attacker infers the secret information by using power consumption as leaked data

A DPA attack is a side channel attack in which an attacker infers the secret information by using statistical analysis of power consumption.

Page 26: Vineet Kumar Sharma (200601093) Ankit Agrawal (200601003)courses.daiict.ac.in/file.php/120/presentation/pres_E1_Secure... · Ankit Agrawal (200601003) - A new approach to hardware

References http://www.eeglossary.com/m2m.htm

http://news.thomasnet.com/fullstory/553978

http://en.wikipedia.org/wiki/Machine_to_Machine

http://www.atmel.com/dyn/resources/prod_documents/6559DS.pdf

http://72.14.235.132/search?q=cache:59mCDjE60LwJ:www.aymanbahaa.com/projects%25202008.pdf+use+o

f+secure+microcontrollers+for+M2M+applications&cd=16&hl=en&ct=clnk

http://en.wikipedia.org/wiki/Machine_to_Machine

Ross J. Anderson, Markus G. Kuhn: Tamper Resistance - a Cautionary Note, The Second USENIX Workshop

on Electronic Commerce, Oakland, California, November 18-21, 1996

Ross J. Anderson, Markus G. Kuhn: Low Cost Attacks on Tamper Resistant Devices, in M.Lomas et al. (ed.),

Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997

Oliver Kmmerling, Markus G. Kuhn: Design Principles for Tamper-Resistant Smartcard Processors, USENIX

Workshop on Smartcard Technology, Chicago, Illinois, USA, May 10-11, 1999