Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-07-02 Thread David Johnston

Thank you.

I like this paper, because its tied into the world of real semiconductor 
processing and diagnostic machines. The understanding of defenses and 
attacks against silicon requires an understanding of the capability of 
these machines and their use.


What makes passive voltage contrast imaging good for detecting Becker 
style trojans is also what makes it a tool for side channel analysis and 
so as with other areas of hardware crypto engineering, knowing the tools 
of the enemy is a prerequisite to knowing what defenses are effective 
and what defenses are not.


DJ


On 7/1/14, 5:31 PM, Tony Arcieri wrote:

This went to the cypherpunks list, but not to the others:

http://eprint.iacr.org/2014/508

Reversing stealthy dopant level trojans!


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-07-01 Thread Tony Arcieri
This went to the cypherpunks list, but not to the others:

http://eprint.iacr.org/2014/508

Reversing stealthy dopant level trojans!
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-26 Thread coderman
On Sun, Jun 22, 2014 at 2:49 AM, coderman coder...@gmail.com wrote:
...
   full URI to PDF for posterity:
  
 http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2014/02/20/BeckerChes13.pdf


one last note:

it has been pointed out that this paper discusses one potential
implementation of the gates in question and does not actually
represent Intel chip designs as produced.  it is not clear how many
potential ASIC runs could be affecting by this technique.

i am accepting BTC donations for a FIB rig and operating costs, with
the promise to public domain the imaging.
 ;)


best regards,
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-22 Thread coderman
On Fri, Sep 13, 2013 at 2:49 AM, Eugen Leitl eu...@leitl.org wrote:
 ...
 http://people.umass.edu/gbecker/BeckerChes13.pdf

 Stealthy Dopant-Level Hardware Trojans ?

 Georg T. Becker1


this paper has disappeared from the net.  any one have copies?
(looking at you, JYA ;)

[bonus points for backstory on the distribution woes]
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-22 Thread stef
On Sun, Jun 22, 2014 at 01:46:44AM -0700, coderman wrote:
 On Fri, Sep 13, 2013 at 2:49 AM, Eugen Leitl eu...@leitl.org wrote:
  ...
  http://people.umass.edu/gbecker/BeckerChes13.pdf
 
  Stealthy Dopant-Level Hardware Trojans ?
 
  Georg T. Becker1
 
 this paper has disappeared from the net.  any one have copies?

http://sgnsa2lp64l6v3l6.onion/BeckerChes13.pdf

-- 
otr fp: https://www.ctrlc.hu/~stef/otr.txt
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-22 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 22/06/14 09:46, coderman wrote:
 On Fri, Sep 13, 2013 at 2:49 AM, Eugen Leitl eu...@leitl.org
 wrote:
 ... http://people.umass.edu/gbecker/BeckerChes13.pdf
 
 Stealthy Dopant-Level Hardware Trojans ?
 
 Georg T. Becker1
 
 
 this paper has disappeared from the net.  any one have copies? 
 (looking at you, JYA ;)

http://www.emsec.rub.de/research/publications/Hardware-Trojans/

 [bonus points for backstory on the distribution woes]

PhD students suck at maintaining their web pages.

Cheers,
Michael
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJTpqUmAAoJEBEET9GfxSfMUz8H/3lqO7I1/4nfe006ebV2IIvO
hsyntYGUri3/42WfeeBfLf3yCwC7bYtgQLOwL5FWM2Y61crBaPYp9BM2HO5o1z/1
E7UH0c+deFtp87jHUaPL4dRxNoLJITm1eAqt4GTJlcgQyy86TWBjbbL0HiwvwdB0
0QWHNJ383sW3b/iZVMIR8Wbpyc/jol0jdcokXiREronT/7L9rw+HW5/eJiVQW0KK
p0b+TPC8MLB/RFLuLNuBYd7ETqrEljGPLMDXYUhCvd5y+0TSTHeWHXS7bAURBlH0
WJzmRWjBtRATT2ARo52ykyLzSiaMaaZxxBXzawkVSVVtmGSxhg8ylM+H1L2xC3Y=
=9aAl
-END PGP SIGNATURE-
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Stealthy Dopant-Level Hardware Trojans

2014-06-22 Thread coderman
On Sun, Jun 22, 2014 at 2:43 AM, Michael Rogers
mich...@briarproject.org wrote:
...
 http://www.emsec.rub.de/research/publications/Hardware-Trojans/
 ...
 PhD students suck at maintaining their web pages.


ah well, :)

  full URI to PDF for posterity:
 
http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2014/02/20/BeckerChes13.pdf


thanks to al!  best regards,
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Stealthy Dopant-Level Hardware Trojans

2013-09-13 Thread Eugen Leitl

http://people.umass.edu/gbecker/BeckerChes13.pdf

Stealthy Dopant-Level Hardware Trojans ?

Georg T. Becker1

, Francesco Regazzoni2

, Christof Paar1,3 , and Wayne P. Burleson1

1University of Massachusetts Amherst, USA

2TU Delft, The Netherlands and ALaRI - University of Lugano, Switzerland

3Horst ortz Institut for IT-Security, Ruhr-Universiat Bochum, Germany

Abstract. 

In recent years, hardware Trojans have drawn the attention of governments and
industry as well as the scientific community. One of the main concerns is
that integrated circuits, e.g., for military or critical infrastructure
applications, could be maliciously manipulated during the manufacturing
process, which often takes place abroad. However, since there have been no
reported hardware Trojans in practice yet, little is known about how such a
Trojan would look like, and how dicult it would be in practice to implement
one.

In this paper we propose an extremely stealthy approach for implementing
hardware Trojans below the gate level, and we evaluate their impact on the
security of the target device. Instead of adding additional circuitry to the
target design, we insert our hardware Trojans by changing the dopant polarity
of existing transistors. Since the modified circuit appears legitimate on all
wiring layers (including all metal and polysilicon), our family of Trojans is
resistant to most detection techniques, including fine-grain optical
inspection and checking against golden chips.  We demonstrate the
ectiveness of our approach by inserting Trojans into two designs | a digital
post-processing derived from Intel's cryptographically secure RNG design used
in the Ivy Bridge processors and a side-channel resistant SBox implementation
and by exploring their detectability and their ects on security.

Keywords: Hardware Trojans, malicious hardware, layout modifications, Trojan
side-channel


signature.asc
Description: Digital signature
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography