
Challenges and Solutions in Combining Anti-Tamper and Open Architecture Systems
Explore the integration of Anti-Tamper requirements into open-architecture systems while maintaining openness benefits. Learn how open architectures can enhance Anti-Tamper technologies, drive technology insertion, and encourage reusability. Discover key challenges and potential solutions discussed in the context of secure system design.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Anti-Tamper in Open Architecture Systems Michael Vai, Kyle Ingols, Josh Kramer, Ford Ennis, Michael Geis, Ted Lyszczarz, Rob Cunningham HPEC 2011 20 September 2011 This work is sponsored by the Department of the Air Force under Air Force Contract FA8721-05-C-0002. Opinions, interpretations, conclusions and recommendations are those of the author and are not necessarily endorsed by the United States Government. HPEC 2011-1 MMV 4/4/2025
Overview Talk Objectives Background Anti Tamper (AT) Open Architecture System Open Architecture vs. AT Crucial Open AT Technologies Summary HPEC 2011-2 MMV 4/4/2025
Talk Objectives Discuss two key challenges in combining anti-tamper and open architecture systems How can Anti-Tamper (AT) requirements be integrated into open-architecture systems and still maintain benefits of openness? How can open-architectures be applied to AT itself to improve the state-of-the-art, foster competitive technology insertion, and promote re-use? Wrapped RTP Signal Processor Phased Array Scheduler Pub/Sub Comms Middleware Operating System Hardware (CPU, Memory, I/O) Open-Architecture System Anti Tamper HPEC 2011-3 MMV 4/4/2025
Overview Talk Objectives Background Anti Tamper (AT) Open Architecture System Open Architecture vs. AT Crucial Open AT Technologies Summary HPEC 2011-4 MMV 4/4/2025
Anti-Tamper (AT) Why do adversaries tamper systems? Countermeasure development Unauthorized technology transfer Unauthorized modification to increase capabilities Anti-Tamper: Technologies aimed at deterring and/or delaying unauthorized exploitation of critical information and technologies Schemes range from simple lock-it- up to deter-detect-react eReader? Android Tablet? http://en.wikipedia.org/wiki/Hainan_Island_incident http://www.npr.org/2011/03/27/134897271/cheaper-than-a-tablet-rooting-your-e-reader HPEC 2011-5 MMV 4/4/2025
Attacks For HPEC, a large percentage of CT/CPI is in software/firmware! Adversary objective: Access/tamper protected code and data Remote Attack Local Attack Intrusive Attack Destructive Attack Gained remote login to the system Malware Lost credentials Trusted relationships Timing attack to discover secret keys Gained physical access Captured or FMS Testbench characterization Side-channel attacks Timing Power, radiation Acoustic Gained access to inside of the system Signal probing Fault analysis Foreign HW/SW insertion Explore memories and disks Gained chip level access Depackaging, drilling, shaving, etc. Reverse engineering ASICs, FPGAs HPEC 2011-6 MMV 4/4/2025
Open Architecture Systems Open HW/SW interface Well-defined modularity 1 Radar Mode 3 Comp Middleware Radar Control Standard OS Avionics Bus AESA Receiver / Exciter Front- End Proc Programmable Control Processor Programmable Signal Processor Standard Comm Middleware 2 Radar Bus Benefits: Permit procurement of subsystems from independent sources Enable computing hardware refresh without major software rewrite Facilitate algorithm insertion ( modes ) by 3rd parties. 1. 2. 3. 3 1 2 HPEC 2011-7 MMV 4/4/2025
Overview Talk Objectives Background Anti Tamper (AT) Open Architecture System Open Architecture vs. AT Crucial Open AT Technologies Summary HPEC 2011-8 MMV 4/4/2025
Open Architecture vs. Anti Tamper Open Architecture Desirable Features Open standard interface: Predictable behavior Modularity: Self- contained, well-defined functional units Refresh: Adoption of 3rd party hardware and software Extensibility & scalability: Enable new capabilities Maintainability: Easy to diagnose and repair AT Desirable Features Deny unauthorized access and obfuscate responses Prevent isolation and attack of individual units Prohibit insertion of unauthorized hardware and software Avoid non-essential points of entry for exploration Disallow poking and changes HPEC 2011-9 MMV 4/4/2025
AT Implications on Open Systems Vendor Lock-In Processing Performance System Parts Modules 10,000 Design frozen Deployment Processing Power 1000 Proprietary Systems Technology Refresh $$$$ Open hardware with portable software Open Systems 100 $ Open Systems w/ Proprietary AT $$$$ Proprietary Hardware 10 Proprietary AT Hardware Open Systems w/ Open AT $ 1 5 10 15 Year AT requirement can force open systems back to being closed and proprietary Solution: Apply open AT technology decoupled from the system Maintain competition and technology refresh Reduce acquisition cost and time HPEC 2011-10 MMV 4/4/2025
Open AT Technologies Open System Desirable Features Open standard interface: Predictable behavior Modularity: Self- contained, well-defined functional units Refresh: Adoption of 3rd party hardware and software Extensibility & scalability: Enable new capabilities AT Desirable Features Open AT Technologies Deny unauthorized access and obfuscate responses Prevent isolation and attack of individual units Prohibit insertion of unauthorized hardware and software Avoid non-essential points of entry for exploration Personalizable standard AT approaches Units only operate in authenticated systems Authenticated hardware and software Encryption of signals and data Personalizable protective packaging and sensing Maintainability: Easy to diagnose and repair Disallow poking and changes HPEC 2011-11 MMV 4/4/2025
Vision of Open AT Technologies Protect Lowest Replaceable Units and CPI Open Open Protected Protected Processing Components Lowest Replaceable Units (LRUs) Personalized LRUs (Unique IDs) Embedded CPI (Critical Program Information) Openness: LRUs manufactured in compliance with published standards AT: only operate with authenticated hardware, software, and firmware Protects at-rest and in-motion critical information with cryptography Authenticates software/firmware in verified LRUs Decouples AT technology from processing components/units Develops personalizable LRUs Reuses LRUs in multiple systems Tech. Competition and Refresh Confidence in System Operations HPEC 2011-12 MMV 4/4/2025
Overview Talk Objectives Background Anti Tamper (AT) Open Architecture System Open Architecture vs. AT Crucial Open AT Technologies Summary HPEC 2011-13 MMV 4/4/2025
Crucial Open AT Technology Candidates AT Functions Technology Assessment Prevent Detect React Allows HW/SW units to be authenticated Can leverage standard cryptography schemes Must standardize protocols and interfaces Needs red teaming Unit Personalization Protects CPI at rest or in motion No unencrypted data ever travel in the clear Can leverage standard encryption algorithms Must standardize interfaces Signal/Data Encryption Protects secret keys from being extracted Many protection schemes are proprietary Need to evaluate their effectiveness Room for innovation Side-Channel Resistance Provides volume protection Many inexpensive and small-size sensors Needs effective integration approaches Issues with standby power Packaging & Sensing Provides protection and unique personalization Several commercial products Needs effective integration approaches Protective PUF* Coating *PUF: Physical Unclonable Function HPEC 2011-14 MMV 4/4/2025
Hardware and Software Authentication AT Control Computer AT Protective PUF Mem. Backplane Proc. Device Loader Software/ Firmware AT Control Computer AT PUF (physical unclonable function) is the key of authentication PUF provides a unique ID for hardware personalization AT control computer verifies the authenticity of the HW/SW assembly Damaged PUF prevents loading software/firmware HPEC 2011-15 MMV 4/4/2025
AT Open-Architecture Signal Processor FPGA Processor Keys Firmware Signals Hardware* B a c k p l a n e FPGA Processor Firmware Signals Hardware* Keys DSP Processor Keys Software Signals Hardware* DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Critical Technology (CT) / Critical Program Information (CPI) Timing protocol, multi-platform coordination Advanced signal processing algorithm Spectral analysis and discrimination Frequencies, waveforms, etc. Essential to protect CT/CPI from being tampered and exploited in all different phases of its life cycle HPEC 2011-16 MMV 4/4/2025
Open AT Capabilities Open AT Capabilities Prevents unauthorized software and firmware access FPGA Processor Keys Firmware Signals Hardware* Disallows hardware/software/firmware replacement B a c k p l a n e Defends against reverse engineering FPGA Processor Firmware Signals Hardware* Keys Shields signals from probing Protects storage from exploration Guards against secret key extraction DSP Processor Keys Software Signals Hardware* Minimum performance impact Ready-to-use architecture DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Authenticated Computing Signal/Data Encryption Side-Channel Resistance Packaging & Sensing PUF Coating Crucial Open AT Technologies HPEC 2011-17 MMV 4/4/2025
Open AT Capabilities Open AT Capabilities Prevents unauthorized software and firmware access FPGA Processor Keys Firmware Signals Hardware* Disallows hardware/software/firmware replacement B a c k p l a n e Defends against reverse engineering FPGA Processor Firmware Signals Hardware* Keys Shields signals from probing Protects storage from exploration Guards against secret key extraction DSP Processor Keys Software Signals Hardware* Minimum performance impact Ready-to-use architecture DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Authenticated Computing Signal/Data Encryption Side-Channel Resistance Packaging & Sensing PUF* Coating Crucial Open AT Technologies HPEC 2011-18 MMV 4/4/2025
Open AT Capabilities Open AT Capabilities Prevents unauthorized software and firmware access FPGA Processor Keys Firmware Signals Hardware* Disallows hardware/software/firmware replacement B a c k p l a n e Defends against reverse engineering FPGA Processor Firmware Signals Hardware* Keys Shields signals from probing Protects storage from exploration Guards against secret key extraction DSP Processor Keys Software Signals Hardware* Minimum performance impact Ready-to-use architecture DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Authenticated Computing Signal/Data Encryption Side-Channel Resistance Packaging & Sensing PUF* Coating Crucial Open AT Technologies HPEC 2011-19 MMV 4/4/2025
Open AT Capabilities Open AT Capabilities Prevents unauthorized software and firmware access FPGA Processor Keys Firmware Signals Hardware* Disallows hardware/software/firmware replacement B a c k p l a n e Defends against reverse engineering FPGA Processor Firmware Signals Hardware* Keys Shields signals from probing Protects storage from exploration Guards against secret key extraction DSP Processor Keys Software Signals Hardware* Minimum performance impact Ready-to-use architecture DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Authenticated Computing Signal/Data Encryption Side-Channel Resistance Packaging & Sensing PUF* Coating Crucial Open AT Technologies HPEC 2011-20 MMV 4/4/2025
Open AT Capabilities Open AT Capabilities Prevents unauthorized software and firmware access FPGA Processor Keys Firmware Signals Hardware* Disallows hardware/software/firmware replacement B a c k p l a n e Defends against reverse engineering FPGA Processor Firmware Signals Hardware* Keys Shields signals from probing Protects storage from exploration Guards against secret key extraction DSP Processor Keys Software Signals Hardware* Minimum performance impact Ready-to-use architecture DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Authenticated Computing Signal/Data Encryption Side-Channel Resistance Packaging & Sensing PUF* Coating Crucial Open AT Technologies HPEC 2011-21 MMV 4/4/2025
Open AT Capabilities Open AT Capabilities Prevents unauthorized software and firmware access FPGA Processor Keys Firmware Signals Hardware* Disallows hardware/software/firmware replacement B a c k p l a n e Defends against reverse engineering FPGA Processor Firmware Signals Hardware* Keys Shields signals from probing Protects storage from exploration Guards against secret key extraction DSP Processor Keys Software Signals Hardware* Minimum performance impact Ready-to-use architecture DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Authenticated Computing Signal/Data Encryption Side-Channel Resistance Packaging & Sensing PUF* Coating Crucial Open AT Technologies HPEC 2011-22 MMV 4/4/2025
Open AT Capabilities Open AT Capabilities Prevents unauthorized software and firmware access FPGA Processor Keys Firmware Signals Hardware* Disallows hardware/software/firmware replacement B a c k p l a n e Defends against reverse engineering FPGA Processor Firmware Signals Hardware* Keys Shields signals from probing Protects storage from exploration Guards against secret key extraction DSP Processor Keys Software Signals Hardware* Minimum performance impact Ready-to-use architecture DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Authenticated Computing Signal/Data Encryption Side-Channel Resistance Packaging & Sensing PUF* Coating Crucial Open AT Technologies HPEC 2011-23 MMV 4/4/2025
Open AT Capabilities Open AT Capabilities Prevents unauthorized software and firmware access FPGA Processor Keys Firmware Signals Hardware* Disallows hardware/software/firmware replacement B a c k p l a n e Defends against reverse engineering FPGA Processor Firmware Signals Hardware* Keys Shields signals from probing Protects storage from exploration Guards against secret key extraction DSP Processor Keys Software Signals Hardware* Minimum performance impact Ready-to-use architecture DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Authenticated Computing Signal/Data Encryption Side-Channel Resistance Packaging & Sensing PUF* Coating Crucial Open AT Technologies HPEC 2011-24 MMV 4/4/2025
Open AT Capabilities Open AT Capabilities Prevents unauthorized software and firmware access FPGA Processor Keys Firmware Signals Hardware* Disallows hardware/software/firmware replacement B a c k p l a n e Defends against reverse engineering FPGA Processor Firmware Signals Hardware* Keys Shields signals from probing Protects storage from exploration Guards against secret key extraction DSP Processor Keys Software Signals Hardware* Minimum performance impact Ready-to-use architecture DSP Processor Keys Software Signals Hardware* Storage Software Data Hardware* Keys * Hardware substitution Crypto Controller/Switch Keys Software Signals Hardware* Authenticated Computing Signal/Data Encryption Side-Channel Resistance Packaging & Sensing PUF* Coating Crucial Open AT Technologies HPEC 2011-25 MMV 4/4/2025
Summary Anti-Tamper in Open Architecture Systems Two key challenges How can Anti-Tamper (AT) requirements be integrated into open- architecture systems and still maintain benefits of openness? How can open-architectures be applied to AT itself to improve the state-of-the-art, foster competitive technology insertion, and promote re-use? A few research directions Assess program-specific needs for AT open systems Research/identify/evaluate crucial AT technologies for open systems Establish AT technology risk reduction roadmap and strategy for AT open systems HPEC 2011-26 MMV 4/4/2025