论文标题

Synfi:开源安全元件的硅前故障分析

SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element

论文作者

Nasahl, Pascal, Osorio, Miguel, Vogel, Pirmin, Schaffner, Michael, Trippel, Timothy, Rizzo, Dominic, Mangard, Stefan

论文摘要

故障攻击是主动的物理攻击,对手可以利用这些攻击来改变嵌入式设备的控制流以获取敏感信息或旁路保护机制。由于这些攻击的严重性,制造商将基于硬件的故障防御措施部署到安全至关重要的系统中,例如安全元素。由于电路组件的复杂相互作用,并且由于当代设计自动化工具倾向于优化插入的结构,从而击败了它们的目的,因此这些对策的开发是一项具有挑战性的任务。因此,至关重要的是,这种对策是经过严格验证后的合成后的。随着经典功能验证技术无法评估对策的有效性,开发人员必须诉诸能够在模拟测试台或物理芯片中注入故障的方法。但是,开发用于在模拟中注入故障的测试序列是一项容易出错的任务,并且在芯片上执行故障攻击需要专门的设备,并且非常耗时。为此,本文介绍了Synfi,这是一种正式的硅质前故障验证框架,该框架在合成的网络名单上运行。 Synfi可用于分析故障对电路及其故障对策输入输出关系的一般影响,因此使硬件设计人员能够以系统和半自动的方式评估和验证嵌入式对策的有效性。为了证明Synfi能够处理与商业和开放工具合成的未经修改的行业网络名单,我们分析了Opentitan,这是第一个开源安全元素。在我们的分析中,我们确定了未经保护的AES块中的关键安全弱点,开发了针对的对策,重新评估了其安全性,并将这些对策贡献回了Opentitan储存库。

Fault attacks are active, physical attacks that an adversary can leverage to alter the control-flow of embedded devices to gain access to sensitive information or bypass protection mechanisms. Due to the severity of these attacks, manufacturers deploy hardware-based fault defenses into security-critical systems, such as secure elements. The development of these countermeasures is a challenging task due to the complex interplay of circuit components and because contemporary design automation tools tend to optimize inserted structures away, thereby defeating their purpose. Hence, it is critical that such countermeasures are rigorously verified post-synthesis. As classical functional verification techniques fall short of assessing the effectiveness of countermeasures, developers have to resort to methods capable of injecting faults in a simulation testbench or into a physical chip. However, developing test sequences to inject faults in simulation is an error-prone task and performing fault attacks on a chip requires specialized equipment and is incredibly time-consuming. To that end, this paper introduces SYNFI, a formal pre-silicon fault verification framework that operates on synthesized netlists. SYNFI can be used to analyze the general effect of faults on the input-output relationship in a circuit and its fault countermeasures, and thus enables hardware designers to assess and verify the effectiveness of embedded countermeasures in a systematic and semi-automatic way. To demonstrate that SYNFI is capable of handling unmodified, industry-grade netlists synthesized with commercial and open tools, we analyze OpenTitan, the first open-source secure element. In our analysis, we identified critical security weaknesses in the unprotected AES block, developed targeted countermeasures, reassessed their security, and contributed these countermeasures back to the OpenTitan repository.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源