security in embedded systems – challenges and oportunities · • in embedded systems the...

33
Security in Security in Embedded Systems Challenges and Oportunities Octavio Nieto-Taladriz García - nieto@die.upm.es Laboratorio de Sistemas Integrados ETSI Telecomunicación - Universidad Politécnica de Madrid

Upload: others

Post on 05-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Security in Security in Embedded Systems –yChallenges and Oportunities

Octavio Nieto-Taladriz García - [email protected] de Sistemas Integrados ETSI Telecomunicación - Universidad Politécnica de Madrid

Page 2: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Index2

• Justification• Attack – Countermeasure Race• Conclusions

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 3: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

The market of embedded systems3

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 4: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Embedded systems everywhere4

WiFiST

MMAMM

• Ambient intelligence MM

ECGECGECG

concept:o Security

MM

SPO2ECG

Actividad

SPO2SPO2ECGECG

ActividadActividad

o Medicalo Energy Servidor de

TelemedicinaInterfaz usuario

Paso de puertas Electrocardiógrafo

o Comforto Etc.

Telemedicina

Concentrador domiciliario

usuario

Interfaz para

Caídas

Pulsioximetría Interfaz para mantenimiento y profesionales

Esfigmomanómetro

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 5: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Justification5

• In embedded systems the security problems In embedded systems the security problems arise earlier:o Reduced processing capabilityo Reduced processing capabilityo Strong limitation in available resources

(batteries, small memories, etc.)(batteries, small memories, etc.)o Usually working in non secure environmentso Strong activity in security breaking technologieso Strong activity in security breaking technologies

• LSI backgroundo Wireless sensor networkso Wireless sensor networkso Adaptable distributed systems

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 6: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Security requirements6

• Common requirements:o User identificationo Network secure accesso Secure communicationso Secure information storageo Availabilityy

• Specific system requirements

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 7: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Embedded Systems Requirements7

• High demand of the actual cipher algorithmso Security processing gap StronARM SA-1110

@206Mhz applying a 10%• Flexibility and interoperability

o Adaptability against attacks

@206Mhz applying a 10% resources to SSL session would get 189 kbpsp y g

• Power consumptiono New cipher algorithms

Pocket PC wit 3DES and SHA uses 21% of power resources to securityo New cipher algorithms

AES or IDEA better in key establishmentBlowfish better in cipher

resources to security

Blowfish better in ciphero Battery life increase 5-8% per year

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 8: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Taxonomy of security attacks8

• Functional objectives:o Privacy attackso Integrity attackso Availability attacks

• Agents (Actives and passives):o Software attacks o Physical attackso Lateral attacks – Execution time, power o Lateral attacks Execution time, power

consumption and failure behavior

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 9: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Initial Scenario

• Embedded system with communication capabilities

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 10: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Initial Scenario

• Embedded system with communication capabilities

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 11: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Initial Scenario

• Embedded system with communication capabilities

…¡hello!.......

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 12: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Threats

• System o Intrusion

• Communication channelo Listenings

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 13: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Security – First attempty p

• Cipher algorithm

…$”·&”%....

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 14: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Security – First attempty p

• Authentication

…$”·&”%....

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 15: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Security – First attempty p

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 16: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Logic attacks

• Objective:o Execute a program in the system

• Way:o Exploit the system weaknessesp y

• Example:o Buffer overflowo Buffer overflow

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 17: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Buffer overflows

S h i bl i d t t i • Search variable size data storage areas in the system memory Li it f th t bl k b id • Limits of the storage block can be override and it is possible to write in other memory areasareas

• If the stack, the dynamic memory area or the pointer to functions are overwritten it is pointer to functions are overwritten, it is possible to execute arbitrary code

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 18: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Buffer overflows

Memory Memory MemoryBufferarea

Bufferarea

Bufferarea

“Ilegal”Program

Stack area Stack area Stack area

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 19: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Countermeasures - logical attack

• Solution: Make the programs in the correct way:o Engineering instead of arto Formal techniques (verification and synthesis)

• Is it enough? NO

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 20: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Timing analysisg y

• Objective:Objective:o Discover the cipher key

• Way:• Way:o Cipher algorithm execution time depends on the

data

• Variation source:o Algorithmgo Processor instruction set (ie. modular exponentiation

uses processor multiplications and divisions that are in time data dependent)time data dependent)

o Compiler optimization (i.e. Chinese Rest Theorem)

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 21: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Countermeasures – Timing attackg

• Solution:o Timing balanceo Introduction of random delays

• Price to pay: Performance degradation!

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 22: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Simple power analysis (SPA)p p y ( )

• Objective:o Get the cipher key

• Way:o Power consumption depends on the switching p p g

activityo Switching activity depends on the input datao Capture the power consumption temporal

evolution

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 23: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Simple power analysis (SPA)

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 24: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Countermeasures - SPA

• Solution:o Decrease the signal to noise ratio:

Reduce the signal levelsExecute additional programsPower management unit

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 25: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Differential power analysis (DPA)

• Performs an statistical analysis

• Hypothesis are confirmed by

t ti ti l l tistatistical correlation• Robust against

t measurement inaccuracyG d lt ith i 8 000 i h t di 128 bit• Good results with high noise

i.e. 8.000 ciphers to discover a 128 bit AES key

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 26: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Countermeasures - DPA

• Problem: Asymmetrical CMOS power consumption

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 27: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Countermeasures - DPA

• Solution:o Dynamic differential logic

Switching activityo Differential routing

Constant capacity

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 28: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Countermeasures - DPA

AES without protection AES with protection

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 29: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Countermeasures - DPA

• Heavy increase in area and power consumption

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 30: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

But….

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 31: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Other attacks…

• Physical attacks (Special packages)• Electrical attacks (Power supply voltages)( pp y g )• ASIC reverse engineering• Fault injection• Fault injection• Electromagnetic emission analysis

(Tempest)(Tempest)• Safe power on?• …

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 32: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Summary

• The attacks look for asymmetries:o SW architecture, algorithm, compiler, HW

architecture, logical design , chip routing, behavior in abnormal conditions.

R t i i li th i t f • Remove asymmetries implies the mixture of different knowledge domains

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid

Page 33: Security in Embedded Systems – Challenges and Oportunities · • In embedded systems the security problems arise earlier: o Reduced processing capability o Strong limitation in

Conclusions

• Security: A new dimension in the design processo Cost, features (performances), power

consumption, security

• Need to define a design flow tolerant to security attacks

SECURWARE – 2007Octavio Nieto-Taladriz GarcíaUniversidad Politécnica de Madrid