Foundations of Trust Part 3

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
8 hours 10 minutes
Difficulty
Advanced
CEU/CPE
8
Video Transcription
00:00
Hi, I'm Matthew Clark. This is lessened 4.3 Foundations of trust. Part three in this lesson will look at a hardware based root of trust, including external ships, integrated ships, the bus architecture, er, an extended security services.
00:18
Then we're gonna look at different levels of security.
00:20
They could be added to integrated chips. So let's get started.
00:24
Let's begin our discussion by examining a silicone based hardware root of trust. There, Really. Two categories of processors that will discuss the first category are fixed function processors, and these are more like state machines. They're small, simple devices meant to perform very limited functions
00:44
very, very well,
00:46
and they could provide cryptographic services such as encryption and decryption and key management.
00:51
But it's going to do a certain thing a certain way, and that's just what it does.
00:56
The second category are programmable processors. This is the category that will spend most of our time discussing in these lessons.
01:04
He's built a root of trust around the CPU, and it could either be a dedicated, secure microprocessor or a system on a chip.
01:12
Unlike a state machine, it is up datable and provides robust functionality, depending on the chip functionality programming and resource is
01:23
let's talk about CPU bus architecture. ER,
01:26
we have two different types. We're gonna talk about external and integrated.
01:30
An external or discrete are dedicated hardware which combined a secure processor with a normal processor.
01:38
These air to external chips that communicate over the bus and requires architecture considerations to protect the chips and the communications on external TPM is a good example of this.
01:51
Integrated are part of a system This combined security components with processors on a system on a chip
01:57
and temper resistance is usually provided by the system on a chip,
02:02
and it could be a dedicated security processor such as an HSM or dice
02:07
hardware. Roots of trust provides security services such as identification, authentication, confidentiality, integrity and measurement,
02:17
as well as extended security services such as encryption and security certificate storage, signing and hashing
02:24
authorization verification, reporting and secure updates as well.
02:30
Common capabilities of the harbor root of trust include a layered security which combines controls such as defense in depth protected storage, secure communications and physical security, and implements security domains, which separate trusted from untrusted,
02:47
and this is commonly referred to as a trusted execution environment or a T E.
02:53
They're generally resistant to attack both from anti tamper physical properties or protected, such as tamper resistance found in the epoch sing the CPU or ball grid array and tamper detection such as secure boot.
03:08
They're generally resistant default injection attacks, side channel resistance, information gathering attacks, passive timing attacks.
03:17
This drawing depicts AH, hardware root of trust that's external,
03:21
an external roots of trust or standalone ships, which are integrated with other microprocessors.
03:27
This provides security services to chips that wouldn't otherwise have, UM,
03:30
which is a good thing. But the communication channel between the security chip and the general purpose chip is subject to exploitation.
03:38
It is more preferred to have an integrated ship.
03:40
Integrated chips give you the ability to customize security according to device requirements. You could design security proportional to the risk. For example, if you needed just a little security, you might consider options such as a ball grid array, which provides physical security as a method to solder the silicon
04:00
to the PCB. They're printed circuit board
04:02
four
04:03
or including one time programmable memory memory that cannot be altered after programming. With this level of security, you could inject identity and firmware into the device and not worry about it being changed later on.
04:15
But every choice you make in regards to security adds cost and complexity,
04:20
and you should start the project project off always with the risk assessment and make your security choices based off of that assessment based on the requirements.
04:30
As a matter of full disclosure, I don't take credit for putting all these functions together in this way of low, medium and high security. Originally, Bruce saw all this presented, I think, in a webinar, um, many moons ago, and I took great notes for internal use and have used it internally. But I didn't write the source down because I never considered I'd be teaching a class
04:50
search the last three months for that webinar on the notes, and I can't find it anywhere. It's like it's disappeared. So whoever created this stuff for organized these things in this way. Great job. I wish I knew who you were, so I could give you credit. But this isn't me. This is someone else in the next few slides, will just kind of I'll present what I what I found
05:10
in the course of my job.
05:13
This simplistic drawing represents the lowest level security that you might expect on a system on a chip. And quite frankly, you're never going to design a system on chip with just these few items or even in this particular way that I'm going to show you.
05:27
Really. What I'm trying to do is just show the how security components can be organized and how you can increase the level of security on a system on the chip
05:35
as you have different requirements.
05:40
So something that's not shown here. RJ tags on DWhite, your common hardware interfaces that provides your computer with a way to communicate directly with the chips on the board.
05:50
And it's originally developed in the mid eighties to test printed circuit boards. But today J tags are generally used for debugging.
05:58
Another component that you could at this layer would be a one time programmable fuse, so burning a fuse is an irreversible process. Once a fuses Barnes, you can't un burn it
06:10
if you burn a fuse and you could prevent the J tax from being used. That's the point of it, which sets the device in a secure state because the threat Actor cannot then use that fuse to enable device debugging.
06:21
So when the devices being developed, it's common for the J tag test access ports or taps to be open. And generally the tap is fused off by the chip of supplier as part of its manufacturing process.
06:34
But if the tap is left open, then the OM will need to secure it.
06:39
This trawling represents a medium level security that you might expect and would include things like Secure boot, which ensures the device boots from a secure state. We're gonna go much deeper into this in a following lesson
06:51
Memory protection unit. This prevents a process from accessing memory that has been allocated to it,
06:58
separating data between processing tasks and protecting vital data. By allowing memory regions to be defined as read only
07:06
generally, the memory protection unit needs to be programmed and enable before use.
07:12
And if the unit is not enabled, the memory system behavior is the same as though no memory protection unit is present.
07:20
True random number generator thes random numbers are integral to cryptographic processes. It's used in challenge responses and nuances.
07:30
The true random number generator ensures that random numbers just can't be predicted
07:35
of security. Bug is another one. It adds authentication so that Onley authorized users can use debug.
07:42
It protects G tec access, and you are That's universal asynchronous receiver and transmitter. It's a lot of words
07:49
on Does Air used for serial device communication, such as Rs 2 32
07:57
which takes us to our higher level of security and would include things such as Advanced Crypto, which adds asymmetric or public key cryptography.
08:05
You'll need a key vault to go along with that replaced the store keys,
08:09
trusted execution environment, A T, partitions the system and implements isolation, and we're gonna go into that in detail. The next lesson.
08:20
Hardware obfuscation, obfuscation means hiding something. So modifying the hardware to hide functionality. Uh, the idea is that if you can't see something, that it makes it difficult to reverse engineering
08:31
an anti tamper, which detects in Tampa ships have been tampered with so you could take appropriate action. Um, it may make the product non operational or may enter a safe mode. It may display a message on the product screen saying Take it to the nearest authorized dealer or may destroy the keys
08:50
Well that's it for this lesson. We covered hardware based root of trust. Specifically, we looked at internal and integrated chips, bus architecture, er, extended security services, and we discussed high medium and low security of integrated chips.
Up Next
IoT Product Security

This course will focus on the fundamentals of how to set up a functioning IoT product security program from the perspective of a company that designs, manufactures, and sells IoT and IIoT devices for consumer or industrial use.

Instructed By