Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis

09/18/2023
by   Xhani Marvin Saß, et al.
0

Physical attacks form one of the most severe threats against secure computing platforms. Their criticality arises from their corresponding threat model: By, e.g., passively measuring an integrated circuit's (IC's) environment during a security-related operation, internal secrets may be disclosed. Furthermore, by actively disturbing the physical runtime environment of an IC, an adversary can cause a specific, exploitable misbehavior. The set of physical attacks consists of techniques that apply either globally or locally. When compared to global techniques, local techniques exhibit a much higher precision, hence having the potential to be used in advanced attack scenarios. However, using physical techniques with additional spatial dependency expands the parameter search space exponentially. In this work, we present and compare two techniques, namely laser logic state imaging (LLSI) and lock-in thermography (LIT), that can be used to discover sub-circuitry of an entirely unknown IC based on optical and thermal principles. We show that the time required to identify specific regions can be drastically reduced, thus lowering the complexity of physical attacks requiring positional information. Our case study on an Intel H610 Platform Controller Hub showcases that, depending on the targeted voltage rail, our technique reduces the search space by around 90 to 98 percent.

READ FULL TEXT

page 1

page 4

page 5

page 6

page 8

page 9

page 10

research
07/21/2021

Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging

The threat of hardware Trojans (HTs) and their detection is a widely stu...
research
02/23/2023

More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models

We are currently witnessing dramatic advances in the capabilities of Lar...
research
10/30/2018

DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks

Recent incidents of data breaches call for organizations to proactively ...
research
09/09/2020

Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model

Due to its sound theoretical basis and practical efficiency, masking has...
research
10/16/2018

Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version)

Efficient key management for automotive networks (CAN) is a critical ele...
research
01/10/2023

Hate Raids on Twitch: Echoes of the Past, New Modalities, and Implications for Platform Governance

In the summer of 2021, users on the livestreaming platform Twitch were t...
research
07/29/2022

Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions

Due to their unmatched entropy, complexity, and security level, optical ...

Please sign up or login with your details

Forgot password? Click here to reset