360 likes | 495 Views
From Design to Resign: Securing the Electronics Lifecycle. Edna Conway. STR1-R11. Chief Security Officer, Global Value Chain Cisco Systems, Inc. @ edna_conway. Dr. Mark Tehranipoor. Intel Charles E. Young Preeminence Endowed Chair Professor in Cybersecurity ECE, University of Florida
E N D
From Design to Resign: Securing the Electronics Lifecycle Edna Conway STR1-R11 Chief Security Officer, Global Value Chain Cisco Systems, Inc. @edna_conway Dr. Mark Tehranipoor Intel Charles E. Young Preeminence Endowed Chair Professor in Cybersecurity ECE, University of Florida tehranipoor@ufl.edu
The Impact of Digital Transformation Business Operations 3rd Party Ecosystem Enterprise Culture
Electronics: The Heart of Digital Transformation Manufacturing Transportation Operations Center Energy
The Fundamentals: Ecosystem Awareness Damage the brand Bot Trojan Fraud Industrial Espionage Political Nation State Worm Root Kit Pivot Throughus to Attack Customers Confidential Data Game the Stock Price Physical Attack Spear Phish Insider Criminal Steal Customer Data Steal IP SQL Inject DOS Exploit the Network
The Fundamentals: Know Your Systems Lifecycle & the Technology Within It Concept Application Development Recursive Iterative Concurrent Parallel Sequenced Execution Production Utilization Support Retirement Source: NIST SP 800-160
The Fundamentals:Understand the Information and Communications (ICT) Value Chain And… The Electronics Supply Chain Within It Design Assembly Fabrication Distribution End of Life Lifetime End of Life Deliver Sustain Design Plan Source Make Quality
The Fundamentals:Identify Who Is In Your ICT Value Chain Scrap Partners Channel/Distributors Cloud Service Providers Recycling Partners OEMs/ODMs Repair /Refurbishment Partners HW Component Suppliers Logistics Partners IOT Devices Manufacturing Partners Open Source Software Software Licensors
The Fundamentals: Identify the Threats Threats Disruption Denial of Service Espionage Unauthorized Visibility Manipulation Unauthorized Control
The Fundamentals: Translate Threats to Exposures Exposures IP Misuse Unauthorized disclosure of intellectual property Information Security Breach Unauthorized access to confidential information Counterfeit Raw materials, finished goods or services which are not authentic Taint Alteration allowing unauthorized control or content visibility
The Fundamentals: The Basics of Hardware Vulnerability • System has • susceptibility or • flaw Attacker gains access to the flaw Attacker Exploit ACCESS GRANTED REDUCED SYSTEM INFORMATION ASSURANCE
Example Security Attacks on Hardware Trojans Physical Attack Counterfeit ICs Untrusted Foundry Side-channel Fault Injection Fake Parts Reverse Engineering
Integrity Breaches Across the Electronics Supply Chain • Cloned ICs • reverse engineered from authentic IC Cloned ICs Overuse IPs • Remarked ICs • false performance and reliability • Overproduced ICs Design Assembly Fabrication Distribution End of Life Lifetime • Remarked ICs • false performance and reliability • Cloned ICs • reverse engineered from authentic IC • Overproduced ICs • Recycled ICs • reuse of scrap ICs • refurbished ICs represented as new
Protection Throughout the Lifecycle Protection Solutions + PUF + ECID Unique IDs for chip and system level authentication in the supply chain Forward Trust Establishing trust between IP vendors, SoC integrators, Foundry and Assembly Design Assembly Fabrication Distribution End of Life Lifetime
Unique IDs PUF + ECID Design Assembly Fabrication Distribution End of Life Lifetime
Innovative Solutions: Chip ID Linked to Electronic Device • Electronic Chip IDs (ECID)can uniquely identify the device • Unclonable IDs acting as a “fingerprint” – data can be read at multiple stages and provide similar results (requires fuzzy logic to compare) • Fingerprints include: • PUFs (Physical Unclonable Functions) • Repeatable test data • SRAM startup signatures • PUFs can generate encryption keys, enabling the chip itself to act as a “root-of-trust” + ECID = Identity (Always the same for a specific chip) UID = Fingerprint (Always similar for a specific chip)
Physical Unclonable Function (PUF) • PUF suffers reliability issues (can’t reproduce signature through lifetime) • Environmental Variation • Aging, Wearout • Aging impact can be improved • Aging resistant design • Reliable RO-pair formation PUF Exploits Inherent Process Variations in Devices (entropy is translated to unique signature) Ring Oscillator PUF
Physical Unclonable Function (PUF) SRAM-PUF: • SRAM is based on a bi-stable latch which will retain its values as long as the circuit is powered. • A mismatch between the inverter pairs affecting their power-up states. • It maps a challenge to a response. Memory PUF
Authentication Throughout Lifecycle Available Now (Market Leaders) 2016 2017 2019 IC & Multi Chip Boards Rework Systems In-Use Returns 1 … N 3 Test Rework Genealogy Performance data 2 Usage Data Test & Process data Reliability Data Cross-industry platform connecting electronics supply chain to semiconductor identity
Authentication Hub Untrusted Trusted Trusted Untrusted CM Board / System OEM Foundry Or OSAT Customer (Home + Business) OCM Enrollment and Authentication Hub
Protection Throughout the Lifecycle FORTIS + Design Assembly Fabrication Distribution End of Life Lifetime
Logic Obfuscation – FSM based Approach • Add an obfuscated mode on top of the original transition functionality. • Obfuscation pattern guides the circuit to normal mode. • Transition arc K3 offers the sole design route from obfuscated mode to normal mode • Obfuscation also protects original functionality – prevents IP Piracy from an untrusted foundry Bhunia, et. al., “HARPOON: an obfuscation-based SoC design methodology for hardware protection,” TCAD 2009.
Design-to-Fab Trust Risk Sell Another SoC Designer IP Piracy License Sell Contract IP Owners Foundry/ Assembly SoC Designer 3PIP1 Chips SoC Design 3PIP2 #chips 3PIPn IC Overproduction IP Overuse #chips #chips Supply Chain
Establishing Forward Trust Sell Another SoC Designer Encrypted and Locked License Sell Contract IP Owners Foundry/ Assembly SoC Designer 3PIP1 Chips SoC Design #chips 3PIP2 Need Keys from SoC Designers Need Keys from 3PIP Owners #chips #chips Supply Chain 3PIPn
Challenges • How to lock a netlist which activates test before unlocking? • How to securely transfer the keys from 3PIP owners and SoC designer to the foundry and assembly? • How to protect an 3PIP from unwanted modification? Sell Another SoC Designer Encrypted and Locked License Sell Contract IP Owners Foundry/ Assembly SoC Designer 3PIP1 Chips SoC Design #chips 3PIP2 Need Keys from SoC Designers Need Keys from 3PIP Owners #chips #chips Supply Chain 3PIPn
Key Transfer: Chip Side System on a Chip
Key Transfer: SoCDesigner Side System on a Chip Designer
IP Overuse System on a Chip
Call to Action: A Secure Ecosystem ? Chip Design Chip Foundry Chip Assembly PCB Assembly System Assembly ? Government Academia EDA Company 3PIP Vendors Security IP Vendors
Stay Aware Unregulated E-waste Exports Fuel Counterfeit Electronics That Undermine U.S. National Security 'Internet Of Things' Hacking Attack Led To Widespread Outage Of Popular Websites World's Biggest Mirai Botnet Is Being Rented Out For DDoS Attacks After Dyn cyberattack, lawmakers seek best path forward Obama to Sign Bill Combating Counterfeit Chips Hackers create more IoT botnets with Mirai source code ‘Internet of things’ was mobilised for internet outage, says Dyn Counterfeit electronics: Another security threat from China House panel to tackle security of internet-connected devices
Global Public-Private Responses EU Horizon 2020 Global Standards U.S. Initiatives
What Can We Do Together Map the Who, What & Where of Your Electronics Ecosystem Monitor Geo-political and Industry Trends Join In Demanding Root of Trust Implement Protection Techniques Innovate with the Electronics Lifecycle in Mind
IP Vendors Distributed Across the Globe Long and globally distributed supply chain of hardware IPs makes SoC design increasingly vulnerable to diverse trust/integrity issues.