紀錄車載資安筆記
紀錄演講
晶片資安標準的現況與未來發展趨勢
前言
- 如何驗證晶片在車載上安全
- 晶片安全才能保證軟體和系統安全
Background
- Chip Security Stanards In 2022
- Chip Security Stanard
- pre-silicon avoid designs containing suspicious cicuits(硬體木馬)
- post-silicon avoid fault injection
- System Software Security Stanard
Attacks
- Side Channel Attacks (旁通到攻擊)
- 用探棒確認波型
- Fault injection(錯誤注入)
- 注入電波時派確認是否被減弱引響
Introduction
Hardware Trojans in ICT devices
- In the past
- Hidden Malicious Software
- Remote Control
- System Backdoors
- now
- Weaponization of Civilian Technology Suppy Chains
Hardware supply chain attack
- supply Security Risks if Chiplet
- Supply Chain Vulnerabilities
Chiplet Security Issues
- Traceability
- Man-in-the-Middle Attack
The Nature of Hardware Attacks
- change the v or software can
- Soc
- Ram
- Rom
- Angin mod
Initial Attack Surface (PCB)
hardware Trojans
- Trigger/Payload (AND-XOR)
Types of Hardware Trojans
- Data Theft
- System Contril
- Damage Infiction
- Specification
- Design
- RTL
Invasive Attacks
Chip Decapsulation
- using chemicals and mechanical tools Decapsulation Chip
- Reverse Engineering
Non-Invasive Attacks
- Side-Channel
- 使用探棒掃描長時間處於加密或解密,儲存電磁波用示波器分析繞過RSA解密
- 分析硬體功能位址
- Fault injection
- Attack Techniques
- Random
- Range
- Fixed
Follow success
- broad parameter testing
- narow down
- Validate the reduced parameters
Challenge 6D
- Time
- Space
- Intensity
- Frequency
- Target
- Data
Challenge
- Encryption
- Starting Point
- Protection
- Challenges with Costly