Anti-tamper JTAG FPGA. JTAG Security HOST

Anti-tamper JTAG FPGA Secure Hardware: What are the BIG challenges? CJ Clark is the president and CEO of Intellitech Corp Corp.. He was the elected ...
1 downloads 0 Views 2MB Size
Anti-tamper JTAG FPGA

Secure Hardware: What are the BIG challenges?

CJ Clark is the president and CEO of Intellitech Corp Corp.. He was the elected chairperson of the IEEE 1149. 1149.1 JTAG working group from 1996 to 2002 2002.. He has been active in other IEEE 1149. 1149.x working groups and has presented at International Test Conference, TECS (Testing Embedded CoresCores-Based Systems) W k h Workshop, th the Board B d T Testt Workshop, W k h Ott Ottawa T Testt Workshop W k h and d VLSI Test Symposium Symposium.. CJ serves on the University of New Hampshire College of Engineering and Physical Science (CEPS) Advisory Board. Board. He also serves on the UNH Department of Electrical Engineering Advisory Board. Board. He is co co--inventor on three US patent related to scan scan--based test, two Canadian, one Taiwanese patent with others pending world--wide world wide.. His first job in test was in 1978 with Wilcom.. Plantronics Plantronics//Wilcom cclarkATintellitechdotcom HOST 2009 1 JTAG Security

Anti-tamper JTAG FPGA

JTAG Hack – 169,000 results

HOST 2009 2 JTAG Security

Anti-tamper JTAG FPGA

Hacking Encouraged by Legit Biz

HOST 2009 3 JTAG Security

Anti-tamper JTAG FPGA

PCB Design Exposed

Andrew Huang – Hacking the Xbox HOST 2009 4 JTAG Security

Anti-tamper JTAG FPGA

FPGAs and tools make it easier Andrew Huang – Hacking the Xbox Small PCB with FPGA is designed to match traces on XBOX. Once in place, it is used to snoop HyperTransport Bus

HOST 2009 5 JTAG Security

Anti-tamper JTAG FPGA

JTAG friend or foe?

Sophisticated Company With No security Experience? Or Intentionally making It easier?

HOST 2009 6 JTAG Security

Anti-tamper JTAG FPGA

DFT Standards – also give access 1149.1 1 – Test T Access A Port P &B Boundary d S Scan S Standard d d •IEEE 1149 Layered y on top p of the 4 pin p IC access of 1149.1: •IEEE 1149.6 - Boundary Scan for AC coupled nets •IEEE 1149.4 – Boundary Scan for Mixed Signal •IEEE 1532 - FPGA configuration over 1149 1149.1 1 •IEEE P1687 - Internal Instrument access w/ 1149.1 •IEEE ????? - A-Toggle Study Group St d G Group •IEEE ????? - SERDES BIST Study IEEE P1149.7 – 2 Wire lowlow-cost 1149.1 IEEE 1500 - SoC & Core test standard IEEE P1581 - Static Interconnect for memories Is it practical to shut JTAG off? (such as IMX32) HOST 2009 7 JTAG Security

Anti-tamper JTAG FPGA

Cloning – doesn’t need JTAG

HOST 2009 8 JTAG Security

Anti-tamper JTAG FPGA

Future?

HOST 2009 9 JTAG Security

Anti-tamper JTAG FPGA

Trojan Bitstreams Need protection:

Non-authenticated Nonbitstream loaded through JTAG into flash

Military Telecomm Gaming Voting Consumer

FLASH J T A G

Plain Text

Trojan Comm Design Comm. Inserted with backdoor

Backdoor Plain Text Cipher Text

Key FPGA accepts Unencrypted FPGA Design despite P Presence off AES k key HOST 2009 10 JTAG Security

Anti-tamper JTAG FPGA

AES Security to the rescue? Xilinx Virtex 4/5 RAM based key – battery backed Use JTAG to program key 256 56 bit b keyy Accepts bitstreams unencrypted Keys exposed to CM Alt Altera St ti III Stratix RAM or ROM II – ROM based Need network blaster to program key 256 bit key Accepts bitstreams unencrypted Keys y exposed p to CM

Battery

Good for protection of IP No pre pre--programming IC Assumes attacker is not loading a trojan bitstream Not available in Spartans and Cyclones Battery/Key programmed PER FPGA HOST 2009 11 JTAG Security

Anti-tamper JTAG FPGA

Alternate Security Security initiated by FPGA

Common key Maxim

Key

Design Enable

SHA1

DS28E01

1-wire

SHA1 Key

USER DESIGN

FPGA

PROM

Program both FPGA and prepre-program Maxim Device with 64 bit SHA1 Key Some logistics for manufacturing required for OBP over 11-wire - keys exposed to CM Trojan in PROM - PROM/FLASH open to nonnon-authenticated bitstream

JTAG

JTAG

HOST 2009 12 JTAG Security

Anti-tamper JTAG FPGA

Trojan/Hack proof FPGA Config -Random data generated by FPGA -SystemBIST Reads via JTAG -Generates Hash -Hash Written via JTAG - Good matching Hash enables user logic

-2nd ‘OK’ Hash Read via JTAG

- SystemBIST S t BIST clears l FPGA on b bad dh hash h

JTAG

Common key

Altera

Xilinx

Hash IP With JTAG Access

Hash IP With JTAG Access

Key not exposed to CM HOST 2009 13 JTAG Security

Anti-tamper JTAG FPGA

Biggest Challenge? 1) Convincing Hardware Designers th t d that despite it size/expertise i / ti off company and engineer, Security i issues should h ld be b lleft ft tto security it experts! 2) PCB/System Level security

-

Enabling JTAG w/o compromise

- Reducing snoop of system

HOST 2009 14 JTAG Security

Anti-tamper JTAG FPGA

Anti--Tamper Basics Anti -Ground planes on Both sides of PCB - Use blind vias under BGA packages to hide trace, prevent probing except with BGA removal -Blacktop/Remark p parts ((0.50p (0.50-$1.00 ea from Intellitech)) -Conformal coat -Consider lockable JTAG gateway devices such as Intellitech Scan Ring Linker -A Anti Antiti-tamper t FPGA C Config fi via i SystemBIST S t BIST -JTAG – shut off or run continuously, integrated with System mission? HOST 2009 15 JTAG Security

Anti-tamper JTAG FPGA

Further Reading Using the Design Security Feature in Stratix II and Stratix II GX Devices, Altera Corporation, July 2008.

http://www.altera.com/literature/an/an341.pdf Trusted Design in FPGAs, Steve Trimberger, Xilinx, Design Automation Conference, 2007 http://videos.dac.com/44th/papers/1_2.pdf

Authentication of FPGA Bitstreams: Why and How, Saar Drimer, ARC 2007

http://www.springerlink.com/content/t71pqn4g7565w806/

A CodeCode-less BIST Processor for Embedded Test and in in--system configuration of Boards and Systems, CJ Clark, Intellitech Corp, Mike Ricchetti, ATI Research, ITC 2004, http://www.intellitech.com/pdf/itc04sb.pdf

Design Security in Stratix III FPGAs, Altera Corporation

http://www.altera.com/products/devices/stratix-fpgas/stratix http://www.altera.com/products/devices/stratixfpgas/stratix-iii/overview/architecture/st3--design iii/overview/architecture/st3 design--security.html

Secure Update Mechanism for Remote Update of FPGA--Based System, Benoît Badrignans1,2, Reouven Elbaz3 and FPGA

Lionel Torres. SEIS 2008, http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel5/4569831/4577 669/04577703.pdf?temp=x HOST 2009 16 JTAG Security

Anti-tamper JTAG FPGA

Further Reading Physical Ph i l Unclonable U l bl Functions F ti ffor D Device i Authentication and Secret Key Generation

G. Edward Suh, Srinivas Devadas http://videos.dac.com/44th/papers/1_3.pdf http://videos dac com/44th/papers/1 3 pdf

Xilinx® FPGA IFF Copy Protection with 11-Wire SHA SHA--1 Secure Memories, Maxim, http://www.maxim--ic.com/appnotes.cfm/an_pk/3826 http://www.maxim

An FPGA Design Security Solution Using a Secure Memory Device, Altera, http://www.altera.com/literature/wp/wp--01033.pdf http://www.altera.com/literature/wp/wp

Altera Alt C Configuration fi ti H Handbook db k http://www.altera.com/literature/lit--config.jsp http://www.altera.com/literature/lit Xilinx VirtexVirtex-5 FPGA User Guide http://www xilinx com/support/documentation/user gui http://www.xilinx.com/support/documentation/user_gui des/ug190.pdf HOST 2009 17 JTAG Security

Suggest Documents