Introduction Flashcards

1
Q

Hardware Trojans

A

An attacker either in the design house or in the
foundry may add malicious circuits or modify existing circuits to bypass,
disable the security fence or destroy the chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP piracy and IC overbuilding

A

An IP user or a rogue foundry may
illegally pirate the IP without the knowledge and consent of the designer. A
malicious foundry may build more than the required number of ICs and sell
the excess ICs in the gray market.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reverse engineering (RE):

A

An attacker can reverse engineer the IC/IP
design to his/her desired abstraction level. He can then reuse the recovered
IP or improve it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Side-channel analysis:

A

An attacker can extract the secret information or
secret keys by exploiting a physical modality (power consumption, timing, or
electromagnetic emission) of the hardware that executes the target
application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Counterfeiting:

A

An attacker illegally forges or imitates the original

component/design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IC

A

Integrated Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Integrated Circuit (IC) Supply Chain And Security

A

Arising hardware security problems because of the global
trends in IC design, manufacturing, and distribution in the
supply chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical attack requirements

A

-direct access to the chip -connection to signals m equipment and knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical attack Interaction:

A

Exploiting
some physical
characteristics of the
device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical attack Exploitation

A

Analyzing the
gathered information to
recover the secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attackers Class I: clever outsiders

A
  • Insufficient knowledge of
    the system
  • Limited access to the
    equipment and tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attackers Class II: knowledgeable

insiders

A

-Knowledge of the system
-Access to tools and
equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attackers Class III: funded

organizations

A

-Access to all resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attacker Motivations

A

-Direct theft of service or
money
-Sell of products
-Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptanalysis vs. Physical Attacks

A
  • Cryptanalysis: mathematical analysis to find the theoretical weakness
  • Physical attacks: exploit weakness in the implementation of the cryptographic algorithms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Modern Cryptographic Algorithms

A
  • Symmetric-key and public-key cryptography
    -Although the algorithm itself may not be broken, a
    particular implementation may be vulnerable to
    attacks.
17
Q

Kerckhoffs’s principle:

A

A cryptosystem should be
secure even if everything about the system, except
the key, is public knowledge.
- For this reason modern cryptography algorithms get
evaluated and analyzed by the community, e.g., AES
standard process.

18
Q

Non-invasive attacks

A

passive vs. active
- No device damage, no tamper
evidence
- Most low cost and repeatable

19
Q

Invasive attacks

A
- Direct access to the inside of the
chip/device
- Reversible vs irreversible
- Device damaged or tamper
evidence left
20
Q

Semi-invasive attacks

A
  • Access to the surface of the chip
  • but will not create contacts with
    internal wires
  • Normally does not damage the system
  • May or may not leave tamper evidence
  • Moderate cost and some special skills
  • Repeatable
  • Cost and required skills vary, normally high
21
Q

Side-channel attacks

A

-monitor/measure chip’s physical characteristics (power,
current, timing, EM radiation, etc.) during its normal
operation
- perform data analysis to learn information

22
Q

Software attacks (non-invasive)

A
  • use normal I/O interface
  • exploit known security vulnerabilities in protocols, algorithms
    and their software implementation
23
Q

Reverse engineering (invasive)

A
  • study chip’s inner structure and functionality

- high cost, the similar capability of the designer

24
Q

Micro-probing (invasive)

A
  • directly access the chip surface

- observe, manipulate, interfere with the chip

25
Q

Fault generation (semi- or non-invasive)

A
  • run in abnormal environmental conditions
  • cause chip to malfunction, leak information, give additional
    access