02.12.2012 Views

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Introduction<br />

Lab attack<br />

1.3.4 Who attacks devices?<br />

The lab attack vector is the most comprehensive and invasive. If the attacker has access<br />

to laboratory equipment, such as electron microscopes, they can perform unlimited<br />

reverse engineering of the device. It must be assumed that the attacker can reverse<br />

engineer transistor-level detail for any sensitive part of the design - including logic and<br />

memories.<br />

Attackers can reverse engineer a design, attach microscopic logic probes to silicon<br />

metal layers, and glitch a running circuit <strong>using</strong> lasers or other techniques. Attackers can<br />

also monitor analog signals, such as device power usage and electromagnetic emissions,<br />

to perform attacks such as cryptographic key analysis.<br />

In most cases, considering the rule of thumb that states every device can be broken, a<br />

device should not try and defend against lab attack directly, but should take measures<br />

which limit the damage when a device is broken and therefore make the lab attack<br />

uneconomical. Use of per-device unique secrets is one example where reverse<br />

engineering a single device provides the attacker with no useful information; they have<br />

the secret for the device that they already own, but not any of the other devices in that<br />

class.<br />

Note<br />

TrustZone technology is designed to provide a hardware-enforced logical separation<br />

between security components and the rest of the SoC infrastructure.<br />

Lab attacks are outside of the scope of the protection provided TrustZone technology,<br />

although a SoC <strong>using</strong> TrustZone can be used in conjunction with an <strong>ARM</strong> SecurCore ©<br />

smartcard if protection against physical attacks is needed for some assets.<br />

Once a designer has identified the assets, and the possible attacks, it is important to<br />

identify the possible attackers. Different attackers can deploy different types of attack,<br />

and certain assets will only attract certain attackers. This analysis can help rationalize<br />

what attacks each asset needs to be protected against.<br />

The analysis should also include a description of who is explicitly trusted with access<br />

to assets stored on the device. This can highlight weaknesses in the security model.<br />

There have been a number of published cases in which consumer data has been stolen<br />

from devices by maintenance or repair technicians, and subsequently published on the<br />

internet.<br />

1-10 Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492C<br />

Non-Confidential Unrestricted Access

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!