- anr blogja
- A hozzászóláshoz be kell jelentkezni
- 1114 megtekintés
Hozzászólások
One of the main selling points of these chips are that you can only write to and verify them using an AES encrpyted data stream, but read back of IP blocks programmed into the FPGA cells shouldn't be possible. All verification logic is internal to the chip and you basically get a 'good' or 'bad' result, well that's a bit of a simplification but that's the general idea.
So as a hypothetical buyer of these chips I can go "ok, I can program these chips remotely and feel safe as I am the only person with the master key. No one can steal my IP off these chips and at the same time no one can re-program these chips without my explicit approval as all that is locked off. These chips don't require external flash as part of the application, so it should be inherently secure right?"
What these guys found is that the JTAG interface for the FPGA actually has direct access to the cells rather than going through the crypto engine, but you need to invoke undocumented commands to do it. So your IP can be extracted without the key. They also found that so-called factory set registers (FROW) which define a variety of parameters for the chip can be set to read/write by another instruction, so properties of the chips can be changed but as for what particular functions FROW does they didn't go into much detail.
As for ramifications - my IP can be extracted whole. The IP can then be deployed on other chips which I didn't authorise, I now have knock-off designs using my IP competing against my own product, not good.
With FROW access it is a bit of a wild card. The report proposes a stuxnet like scenario where these chips can be re-programmed entirely out-of-factory. For example, if FROW could change the crypto engine parameters then an attacker can upload a new firmware remotely and then change the crypto engine overwriting it their key -my 'master' key will no longer work and I'd need to use the same backdoor to reverse it, that is if I knew it existed. This is speculation, for all we know the AES key might really be non-configurable but this report didn't confirm that. At the very least this report showed that there is undocumentaed functionality which contradicts the marketing material and the security model, with the sort of access you can get via backdoor JTAG who knows what can happen?
These chips also pass standard chip verification tests, they had to use a bespoke jig and a 2 week period to find this backdoor. The next stage is figuring out how to find these backdoors faster.
--
Live free, or I f'ing kill you.
- A hozzászóláshoz be kell jelentkezni
És?
Az USÁban törvény van rá, hogy minden szarba (chip, oprendszer, egyéb dolgok) bejutást kell biztosítani a kormányzat részére. Backdoor nélkül ott még tán egy villanykörtét sem lehet eladni.
Úgyhogy jó reggelt kívánok.:-)
- A hozzászóláshoz be kell jelentkezni
Csakhogy ok a kinai gyartasu cuccok miatt aggodnak :)
- A hozzászóláshoz be kell jelentkezni
Mert Kínában is olyan törvény van...:-)))
- A hozzászóláshoz be kell jelentkezni