Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516717
|View full text |Cite
|
Sign up to set email alerts
|

Breaking and entering through the silicon

Abstract: As the surplus market of failure analysis equipment continues to grow, the cost of performing invasive IC analysis continues to diminish. Hardware vendors in high-security applications utilize security by obscurity to implement layers of protection on their devices. High-security applications must assume that the attacker is skillful, well-equipped and wellfunded. Modern security ICs are designed to make readout of decrypted data and changes to security configuration of the device impossible. Countermeasures s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 98 publications
(46 citation statements)
references
References 23 publications
0
46
0
Order By: Relevance
“…Undeniably, one of the fundamental security challenges for vendors is the providing a protection scheme against advanced semi-and fully-invasive attacks from the IC backside. While fully-invasive techniques, such as FIB microprobing [36], are taken seriously by the chip manufactures, not enough attention has been paid to optical semi-invasive attacks in the past.…”
Section: Discussionmentioning
confidence: 99%
“…Undeniably, one of the fundamental security challenges for vendors is the providing a protection scheme against advanced semi-and fully-invasive attacks from the IC backside. While fully-invasive techniques, such as FIB microprobing [36], are taken seriously by the chip manufactures, not enough attention has been paid to optical semi-invasive attacks in the past.…”
Section: Discussionmentioning
confidence: 99%
“…The hardware RoT orthodoxy is a secret key embedded in the hardware [87], for instance, a key stored in the non-volatile memories of the IC. Unfortunately, the vulnerability of such legacy key storage methods to semi-and fully-invasive attacks, has been reported in the literature [47,58,112,115]. It has been demonstrated that even in the presence of sophisticated countermeasures, it is hard to stop an adversary attempting to circumvent these security measures and gain access to the memories.…”
Section: Hardware Root Of Trustmentioning
confidence: 99%
“…While the PUF manufacturers have been contributing to improve the design, and consequently, the security of the PUFs, adversaries are simultaneously developing non-invasive and semi-invasive attacks against these primitives [46,47,95,109]. For instance, it has been shown that an Arbiter…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
“…For instance, one can cut off the trigger signal from alerting the CPU of an attack [19]. A practical FIB attack has been demonstrated by probing the backside of an IC [20].…”
Section: A Invasive Attacksmentioning
confidence: 99%