A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components

被引:11
|
作者
Mavroudis, Vasilios [1 ]
Cerulli, Andrea [1 ]
Svenda, Petr [2 ]
Cvrcek, Dan [3 ]
Klinec, Dusan [3 ]
Danezis, George [1 ]
机构
[1] UCL, London, England
[2] Masaryk Univ, Brno, Czech Republic
[3] EnigmaBridge, Cambridge, England
基金
欧洲研究理事会;
关键词
cryptographic hardware; hardware trojans; backdoor-tolerance; secure architecture; MULTISIGNATURES; SIGNATURES; TROJANS;
D O I
10.1145/3133956.3133961
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders introduce malicious circuitry into the final products. Additionally, despite extensive post-fabrication testing, it is not uncommon for ICs with subtle fabrication errors to make it into production systems. While many systems may be able to tolerate a few byzantine components, this is not the case for cryptographic hardware, storing and computing on confidential data. For this reason, many error and backdoor detection techniques have been proposed over the years. So far all attempts have been either quickly circumvented, or come with unrealistically high manufacturing costs and complexity. This paper proposes Myst, a practical high-assurance architecture, that uses commercial off-the-shelf (COTS) hardware, and provides strong security guarantees, even in the presence of multiple malicious or faulty components. The key idea is to combine protective-redundancy with modern threshold cryptographic techniques to build a system tolerant to hardware trojans and errors. To evaluate our design, we build a Hardware Security Module that provides the highest level of assurance possible with COTS components. Specifically, we employ more than a hundred COTS secure cryptocoprocessors, verified to FIPS140-2 Level 4 tamper-resistance standards, and use them to realize high-confidentiality random number generation, key derivation, public key decryption and signing. Our experiments show a reasonable computational overhead (less than 1% for both Decryption and Signing) and an exponential increase in backdoor-tolerance as more ICs are added.
引用
下载
收藏
页码:1583 / 1600
页数:18
相关论文
共 10 条
  • [1] A Tool-Chain for High-Assurance Cryptographic Software
    Almeida, Jose
    Barbosa, Manuel
    Pacheco, Hugo
    Pereira, Vitor
    ERCIM NEWS, 2016, (106): : 14 - +
  • [2] The Last Mile: High-Assurance and High-Speed Cryptographic Implementations
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Barthe, Gilles
    Gregoire, Benjamin
    Koutsos, Adrien
    Laporte, Vincent
    Oliveira, Tiago
    Strub, Pierre-Yves
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 965 - 982
  • [3] High-Assurance Cryptography: Cryptographic Software We Can Trust
    Barthe, Gilles
    IEEE SECURITY & PRIVACY, 2015, 13 (05) : 86 - 89
  • [4] Trustworthy Hardware from Untrusted Components
    Sethumadhavan, Simha
    Waksman, Adam
    Suozzo, Matthew
    Huang, Yipeng
    Eum, Julianna
    COMMUNICATIONS OF THE ACM, 2015, 58 (09) : 60 - 71
  • [5] The Mechanized Marriage of Effects and Monads with Applications to High-assurance Hardware
    Reynolds, Thomas N.
    Procter, Adam
    Harrison, William L.
    Allwein, Gerard
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (01)
  • [6] Lessons Learned from Building a High-Assurance Crypto Gateway
    Weissman, Clark
    Levin, Timothy E.
    IEEE SECURITY & PRIVACY, 2011, 9 (01) : 31 - 39
  • [7] High-assurance synthesis of security services from basic microservices
    Kim, S
    Bastani, FB
    Yen, IL
    ISSRE 2003: 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2003, : 154 - 165
  • [8] Lessons from VAX/SVS for High-Assurance VM Systems
    Lipner, Steve
    Jaeger, Trent
    Zurko, Mary Ellen
    IEEE SECURITY & PRIVACY, 2012, 10 (06) : 26 - 35
  • [9] Machine-Checked Proofs for Cryptographic Standards Indifferentiability of SPONGE and Secure High-Assurance Implementations of SHA-3
    Almeida, Jose Bacelar
    Baritel-Ruet, Cecile
    Barbosa, Manuel
    Barthe, Gilles
    Dupressoir, Francois
    Gregoire, Benjamin
    Laporte, Vincent
    Oliveira, Tiago
    Stoughton, Alley
    Strub, Pierre-Yves
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1607 - 1622
  • [10] Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers
    Bronchain, Olivier
    Dassy, Louis
    Faust, Sebastian
    Standaert, Francois-Xavier
    PROCEEDINGS OF THE 2018 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'18), 2018, : 1 - 10