ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Introduction<br />
Lab attack<br />
1.3.4 Who attacks devices?<br />
The lab attack vector is the most comprehensive and invasive. If the attacker has access<br />
to laboratory equipment, such as electron microscopes, they can perform unlimited<br />
reverse engineering of the device. It must be assumed that the attacker can reverse<br />
engineer transistor-level detail for any sensitive part of the design - including logic and<br />
memories.<br />
Attackers can reverse engineer a design, attach microscopic logic probes to silicon<br />
metal layers, and glitch a running circuit <strong>using</strong> lasers or other techniques. Attackers can<br />
also monitor analog signals, such as device power usage and electromagnetic emissions,<br />
to perform attacks such as cryptographic key analysis.<br />
In most cases, considering the rule of thumb that states every device can be broken, a<br />
device should not try and defend against lab attack directly, but should take measures<br />
which limit the damage when a device is broken and therefore make the lab attack<br />
uneconomical. Use of per-device unique secrets is one example where reverse<br />
engineering a single device provides the attacker with no useful information; they have<br />
the secret for the device that they already own, but not any of the other devices in that<br />
class.<br />
Note<br />
TrustZone technology is designed to provide a hardware-enforced logical separation<br />
between security components and the rest of the SoC infrastructure.<br />
Lab attacks are outside of the scope of the protection provided TrustZone technology,<br />
although a SoC <strong>using</strong> TrustZone can be used in conjunction with an <strong>ARM</strong> SecurCore ©<br />
smartcard if protection against physical attacks is needed for some assets.<br />
Once a designer has identified the assets, and the possible attacks, it is important to<br />
identify the possible attackers. Different attackers can deploy different types of attack,<br />
and certain assets will only attract certain attackers. This analysis can help rationalize<br />
what attacks each asset needs to be protected against.<br />
The analysis should also include a description of who is explicitly trusted with access<br />
to assets stored on the device. This can highlight weaknesses in the security model.<br />
There have been a number of published cases in which consumer data has been stolen<br />
from devices by maintenance or repair technicians, and subsequently published on the<br />
internet.<br />
1-10 Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492C<br />
Non-Confidential Unrestricted Access