26
HPEC 2011-1 MMV 10/25/2011 Anti-Tamper in Open Architecture Systems Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham HPEC 2011 20 September 2011 This work is sponsored by the Department of the Air Force under Air Force Contract FA8721-05-C-0002. Opinions, interpretations, conclusions and recommendations are those of the author and are not necessarily endorsed by the United States Government.

Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-1 MMV 10/25/2011

Anti-Tamper in Open Architecture Systems Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis,

Michael Geis, Ted Lyszczarz, Rob Cunningham

HPEC 2011

20 September 2011

This work is sponsored by the Department of the Air Force under Air Force Contract FA8721-05-C-0002. Opinions, interpretations, conclusions and recommendations are those of the author and are not necessarily endorsed by the United States Government.

Page 2: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-2 MMV 10/25/2011

• Talk Objectives

• Background – Anti Tamper (AT) – Open Architecture System

• Open Architecture vs. AT

• Crucial Open AT Technologies

• Summary

Overview

Page 3: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-3 MMV 10/25/2011

• Discuss two key challenges in combining anti-tamper and open architecture systems

– How can Anti-Tamper (AT) requirements be integrated into open-architecture systems and still maintain benefits of openness?

– How can open-architectures be applied to AT itself to improve the state-of-the-art, foster competitive technology insertion, and promote re-use?

Talk Objectives

Hardware (CPU, Memory, I/O) Operating System

Pub/Sub Comms Middleware

“Wrapped” RTP

Signal Processor

Phased Array Scheduler

Open-Architecture System Anti Tamper

Page 4: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-4 MMV 10/25/2011

• Talk Objectives

• Background – Anti Tamper (AT) – Open Architecture System

• Open Architecture vs. AT

• Crucial Open AT Technologies

• Summary

Overview

Page 5: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-5 MMV 10/25/2011

• Why do adversaries tamper systems?

– Countermeasure development

– Unauthorized technology transfer

– Unauthorized modification to increase capabilities

• Anti-Tamper:

– Technologies aimed at deterring and/or delaying unauthorized exploitation of critical information and technologies

– Schemes range from simple “lock-it-up” to “deter-detect-react”

Anti-Tamper (AT)

http://en.wikipedia.org/wiki/Hainan_Island_incident http://www.npr.org/2011/03/27/134897271/cheaper-than-a-tablet-rooting-your-e-reader

eReader? Android Tablet?

Page 6: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-6 MMV 10/25/2011

Destructive Attack • Gained remote

“login” to the system – Malware – Lost credentials – Trusted

relationships • Timing attack to

discover secret keys

Attacks

Remote Attack Local

Attack Intrusive Attack

• Gained physical access – Captured or

FMS • Testbench

characterization • Side-channel

attacks – Timing – Power, radiation – Acoustic

• Gained access to inside of the system – Signal probing – Fault analysis – Foreign HW/SW

insertion – Explore

memories and disks

• Gained chip level access – Depackaging,

drilling, shaving, etc.

• Reverse engineering – ASICs, FPGAs

Adversary objective: Access/tamper protected code and data

For HPEC, a large percentage of CT/CPI is in software/firmware!

Page 7: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-7 MMV 10/25/2011

Open Architecture Systems

AESA

Receiver / Exciter

Programmable Control

Processor

Programmable Signal

Processor

Standard OS

Front-End Proc

Avi

onic

s B

us

Radar Bus

Standard Comm Middleware

Radar Control Comp Middleware

Radar Mode

Benefits: 1. Permit procurement of subsystems from independent sources 2. Enable computing hardware refresh without major software rewrite 3. Facilitate algorithm insertion (“modes”) by 3rd parties.

1 • Open HW/SW interface • Well-defined modularity

3

2

1 2 3

Page 8: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-8 MMV 10/25/2011

• Talk Objectives

• Background – Anti Tamper (AT) – Open Architecture System

• Open Architecture vs. AT

• Crucial Open AT Technologies

• Summary

Overview

Page 9: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-9 MMV 10/25/2011

Open Architecture vs. Anti Tamper

Open Architecture Desirable Features AT Desirable Features

Open standard interface: Predictable behavior

Deny unauthorized access and obfuscate responses

Modularity: Self-contained, well-defined functional units

Prevent isolation and attack of individual units

Refresh: Adoption of 3rd party hardware and software

Prohibit insertion of unauthorized hardware and software

Extensibility & scalability: Enable new capabilities

Avoid non-essential points of entry for exploration

Maintainability: Easy to diagnose and repair

Disallow poking and changes

Page 10: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-10 MMV 10/25/2011

• AT requirement can force open systems back to being closed and proprietary

• Solution: Apply open AT technology decoupled from the system – Maintain competition and technology refresh – Reduce acquisition cost and time

AT Implications on Open Systems

Year 5 10 15

1

10

100

1000

10,000 D

esig

n fr

ozen

Proprietary Hardware

Dep

loym

ent

Open hardware with portable software

Technology Refresh

Proc

essi

ng P

ower

Processing Performance

Proprietary AT Hardware

Proprietary Systems

Open Systems

Open Systems w/ Proprietary AT

Open Systems w/ Open AT

$$$$

$

$$$$

$

Parts Modules System Vendor Lock-In

Page 11: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-11 MMV 10/25/2011

Open AT Technologies

Open System Desirable Features AT Desirable Features Open AT Technologies

Open standard interface: Predictable behavior

Deny unauthorized access and obfuscate responses

Personalizable standard AT approaches

Modularity: Self-contained, well-defined functional units

Prevent isolation and attack of individual units

Units only operate in authenticated systems

Refresh: Adoption of 3rd party hardware and software

Prohibit insertion of unauthorized hardware and software

Authenticated hardware and software

Extensibility & scalability: Enable new capabilities

Avoid non-essential points of entry for exploration

Encryption of signals and data

Maintainability: Easy to diagnose and repair

Disallow poking and changes

Personalizable protective packaging and sensing

Page 12: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-12 MMV 10/25/2011

• Decouples AT technology from processing components/units

• Develops personalizable LRUs • Reuses LRUs in multiple systems

• Protects at-rest and in-motion critical information with cryptography

• Authenticates software/firmware in verified LRUs

Vision of Open AT Technologies Protect Lowest Replaceable Units and CPI

Processing Components

Lowest Replaceable Units (LRUs)

Personalized LRUs (Unique IDs)

Embedded CPI (Critical Program Information) AT: only operate with authenticated

hardware, software, and firmware

Confidence in System Operations

Openness: LRUs manufactured in compliance with published standards

Tech. Competition and Refresh

Open Open Protected Protected

Page 13: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-13 MMV 10/25/2011

• Talk Objectives

• Background – Anti Tamper (AT) – Open Architecture System

• Open Architecture vs. AT

• Crucial Open AT Technologies

• Summary

Overview

Page 14: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-14 MMV 10/25/2011

Technology AT Functions

Assessment Prevent Detect React

• Allows HW/SW units to be authenticated • Can leverage standard cryptography schemes • Must standardize protocols and interfaces • Needs red teaming

• Protects CPI at rest or in motion • No unencrypted data ever travel in the clear • Can leverage standard encryption algorithms • Must standardize interfaces

• Protects secret keys from being extracted • Many protection schemes are proprietary • Need to evaluate their effectiveness • Room for innovation

• Provides volume protection • Many inexpensive and small-size sensors • Needs effective integration approaches • Issues with standby power

• Provides protection and unique personalization • Several commercial products • Needs effective integration approaches

Crucial Open AT Technology Candidates

Signal/Data Encryption

Packaging & Sensing

Protective PUF*

Coating

Side-Channel Resistance

Unit Personalization

*PUF: Physical Unclonable Function

Page 15: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-15 MMV 10/25/2011

• AT PUF (physical unclonable function) is the “key” of authentication – PUF provides a unique ID for hardware personalization – AT control computer verifies the authenticity of the HW/SW assembly

• Damaged PUF prevents loading software/firmware

Hardware and Software Authentication

Proc. Device

Loader

Software/ Firmware

AT Protective PUF AT Control Computer

AT Control

Computer B

ackp

lane

Mem.

Page 16: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-16 MMV 10/25/2011

• Critical Technology (CT) / Critical Program Information (CPI)

– Timing protocol, multi-platform coordination – Advanced signal processing algorithm

Spectral analysis and discrimination Frequencies, waveforms, etc.

AT Open-Architecture Signal Processor

Essential to protect CT/CPI from being tampered and exploited in all different phases of its life cycle

* Hardware substitution

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Page 17: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-17 MMV 10/25/2011

Open AT Capabilities Open AT Capabilities

Prevents unauthorized software and firmware access

Disallows hardware/software/firmware replacement

Defends against reverse engineering

Shields signals from probing

Protects storage from exploration

Guards against secret key extraction

Minimum performance impact

Ready-to-use architecture

Signal/Data Encryption

Packaging & Sensing

PUF Coating

Side-Channel Resistance

Authenticated Computing

Crucial Open AT Technologies

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware* * Hardware substitution

Page 18: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-18 MMV 10/25/2011

Open AT Capabilities Open AT Capabilities

Prevents unauthorized software and firmware access

Disallows hardware/software/firmware replacement

Defends against reverse engineering

Shields signals from probing

Protects storage from exploration

Guards against secret key extraction

Minimum performance impact

Ready-to-use architecture

Signal/Data Encryption

Packaging & Sensing

PUF* Coating

Side-Channel Resistance

Authenticated Computing

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware* * Hardware substitution

Crucial Open AT Technologies

Page 19: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-19 MMV 10/25/2011

Open AT Capabilities Open AT Capabilities

Prevents unauthorized software and firmware access

Disallows hardware/software/firmware replacement

Defends against reverse engineering

Shields signals from probing

Protects storage from exploration

Guards against secret key extraction

Minimum performance impact

Ready-to-use architecture

Signal/Data Encryption

Packaging & Sensing

PUF* Coating

Side-Channel Resistance

Authenticated Computing

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware* * Hardware substitution

Crucial Open AT Technologies

Page 20: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-20 MMV 10/25/2011

Open AT Capabilities Open AT Capabilities

Prevents unauthorized software and firmware access

Disallows hardware/software/firmware replacement

Defends against reverse engineering

Shields signals from probing

Protects storage from exploration

Guards against secret key extraction

Minimum performance impact

Ready-to-use architecture

Signal/Data Encryption

Packaging & Sensing

PUF* Coating

Side-Channel Resistance

Authenticated Computing

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware* * Hardware substitution

Crucial Open AT Technologies

Page 21: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-21 MMV 10/25/2011

Open AT Capabilities Open AT Capabilities

Prevents unauthorized software and firmware access

Disallows hardware/software/firmware replacement

Defends against reverse engineering

Shields signals from probing

Protects storage from exploration

Guards against secret key extraction

Minimum performance impact

Ready-to-use architecture

Signal/Data Encryption

Packaging & Sensing

PUF* Coating

Side-Channel Resistance

Authenticated Computing

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware* * Hardware substitution

Crucial Open AT Technologies

Page 22: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-22 MMV 10/25/2011

Open AT Capabilities Open AT Capabilities

Prevents unauthorized software and firmware access

Disallows hardware/software/firmware replacement

Defends against reverse engineering

Shields signals from probing

Protects storage from exploration

Guards against secret key extraction

Minimum performance impact

Ready-to-use architecture

Signal/Data Encryption

Packaging & Sensing

PUF* Coating

Side-Channel Resistance

Authenticated Computing

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware* * Hardware substitution

Crucial Open AT Technologies

Page 23: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-23 MMV 10/25/2011

Open AT Capabilities Open AT Capabilities

Prevents unauthorized software and firmware access

Disallows hardware/software/firmware replacement

Defends against reverse engineering

Shields signals from probing

Protects storage from exploration

Guards against secret key extraction

Minimum performance impact

Ready-to-use architecture

Signal/Data Encryption

Packaging & Sensing

PUF* Coating

Side-Channel Resistance

Authenticated Computing

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware* * Hardware substitution

Crucial Open AT Technologies

Page 24: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-24 MMV 10/25/2011

Open AT Capabilities Open AT Capabilities

Prevents unauthorized software and firmware access

Disallows hardware/software/firmware replacement

Defends against reverse engineering

Shields signals from probing

Protects storage from exploration

Guards against secret key extraction

Minimum performance impact

Ready-to-use architecture

Signal/Data Encryption

Packaging & Sensing

PUF* Coating

Side-Channel Resistance

Authenticated Computing

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware* * Hardware substitution

Crucial Open AT Technologies

Page 25: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-25 MMV 10/25/2011

Open AT Capabilities Open AT Capabilities

Prevents unauthorized software and firmware access

Disallows hardware/software/firmware replacement

Defends against reverse engineering

Shields signals from probing

Protects storage from exploration

Guards against secret key extraction

Minimum performance impact

Ready-to-use architecture

Signal/Data Encryption

Packaging & Sensing

PUF* Coating

Side-Channel Resistance

Authenticated Computing

FPGA Processor

FPGA Processor

DSP Processor

DSP Processor

Storage

Crypto Controller/Switch

Backplane

Firmware

Firmware

Software

Software

Data

Signals

Signals

Signals

Signals

Software

Keys

Keys

Keys

Keys

Keys

Keys Signals

Software

Hardware*

Hardware*

Hardware*

Hardware*

Hardware*

Hardware* * Hardware substitution

Crucial Open AT Technologies

Page 26: Anti-Tamper in Open Architecture Systems · Open Architecture Systems . Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham . HPEC 2011

HPEC 2011-26 MMV 10/25/2011

Summary

• Two key challenges

– How can Anti-Tamper (AT) requirements be integrated into open-architecture systems and still maintain benefits of openness?

– How can open-architectures be applied to AT itself to improve the state-of-the-art, foster competitive technology insertion, and promote re-use?

• A few research directions

– Assess program-specific needs for AT open systems – Research/identify/evaluate crucial AT technologies for open

systems – Establish AT technology risk reduction roadmap and strategy for

AT open systems

Anti-Tamper in Open Architecture Systems