5.2 Hot Topic: Hacking and Protecting Hardware: Threats and Challenges

Printer-friendly version PDF version

Date: Wednesday 26 March 2014
Time: 08:30 - 10:00
Location / Room: Konferenz 6

Organisers:
Said Hamdioui, TU Delft, NL
Giorgio Di Natale, LIRMM, FR

Chair:
Said Hamdioui, TU Delft, NL

Co-Chair:
Giorgio Di Natale, LIRMM, FR

For this Hot-Topic Session, we will have four leading researchers and experienced speakers from different companies to address both hacking and protecting ICs for chip data. Two speakers will focus on the weaknesses of IC and systems and the ways they can be hacked to retrieve secret data, while the other two will cover smart schemes that can be used to protect ICs from such attacks.

TimeLabelPresentation Title
Authors
08:305.2.1HARDWARE ATTACKS ON SECURE ICS
Speaker:
Gerard van Battum, Brightsight, NL
Abstract
He will talk a little bit about the history of attacks and their evolution till today. Thereafter, an overview and a classification of different attacks and their effects will be discussed. Examples will be given of hardware attack techniques on actual secure ICs, such as reverse engineering, mechanical probing, (e-beam) microscopy, etching and polishing, ROM code analysis and Focused Ion Beam modification. This will be put in perspective with commonly applied design practices to protect state-of-the-art secure ICs, which make hardware attacks more difficult.
08:525.2.2ATTACKING SMART PHONES
Speaker:
Jean-Luc Danger, Secure IC, FR
Abstract
He will address the attack on mobile phones by side-channel. The cryptographic functions executed by the mobile phone processor leak information via the electromagnetic channel. Thus, this non-intrusive observation of the leakage is exploitable at distance to retrieve the secret keys of the cryptographic algorithms. Some attack examples will be given to demonstrate the power of such threats.
09:155.2.3SECURING SYSTEM ON CHIPS
Speaker:
Fethulah Smailbegovic, ESCRYPT GmbH – Embedded Security, DE
Abstract
He will focus on the challenge of securing generic System on Chip (SoC) architectures. Growing SoC complexity, costs and short time-to-market requirements limit the availability of dedicated hardware security solutions in SoC architectures introducing new potential security risks. Answering the question of how to build secure and reliable SoCs is one of the major challenges in the near future. First, he will briefly talk about current state-of-the-art security solutions in SoCs and afterwards about architectural requirements for future secure System on Chip architectures.
09:375.2.4SILICONAP: A SILICON AUTHENTICATION PLATFORM FOR SECURITY AND ANTI- COUNTERFEITING
Speaker:
Mohammad Tehranipoor, TrueLogic, US
Abstract
He will talk about design for security and anti-counterfeiting. His talk includes new design techniques for Trojan detection, Trojan prevention, vulnerability analysis, as well as design techniques for preventing counterfeiting of integrated circuits and providing means for easy detection.
10:00End of session
Coffee Break in Exhibition Area
On Tuesday-Thursday the coffee and lunch breaks will be located in the Exhibition Area (Terrace Level).