Ion beam used to wiretap secure chips

Powered by SC Magazine
 

Could bypass military-grade security.

A technique has been developed to bypass elaborate physical protections and siphon data off the most secure chips potentially including those used to protect military secrets.

The proof-of-concept technique demonstrated by researchers at Berlin's Technical University and security consultancy IOActive was successfully applied to a low-security Atmel chip commonly used in TiVo video recording devices.

The lazor scanner

But the research team found that their complex and expensive attack could be applied to successfully pry data from highly-secure chips.

The attack used a polishing machine to mill down the silicon on the target chip until it was 30 micrometers thin.

The chip was then placed under a laser microscope fitted with an infrared camera to observe heat emanating from where encryption algorithms were running.

A focused ion-beam was then shot at the chip which dug a series of two micrometer -deep trenches in which wiretap probes were inserted.

Together, the elaborate techniques if bolstered by the use of more expensive equipment not available to the researchers could potentially bypass the most advanced chip security mechanisms.

Such mechanisms included a wire mesh that served as a last line of physical defense by destroying data if it was disturbed.

Due to the cost and sophistication of the attack techniques, only well funded laboratories could realistically make use of it, the researchers said.

However Stony Brook University computer scientist Radu Sion said the work demonstrated that no chip was completely safe from attack.

“The assumption in the software community, including the cryptographic community, is that when you put something on a chip [they] are hard to touch, hard to get to,’ Sion said.

"Things are not as clear-cut as people thought before. There is no tamper-proof chip.”

The work by the university research team of Clemens Helfmeier, Dmitry Nedospasov, Jan Krissler, Christian Boit and Jean-Pierre Seifert along and IO Active's Christopher Tarnovsky will be presented at Berlin's ACM Conference on Computer and Communications Security in November.

Copyright © SC Magazine, Australia


Ion beam used to wiretap secure chips
 
 
 
Top Stories
Abbott brings back Science minister in cabinet reshuffle
Science tacked onto to Industry title.
 
Beyond ACORN: Cracking the infosec skills nut
[Blog post] Could the Government's cybercrime focus be a catalyst for change?
 
The iTnews Benchmark Awards
Meet the best of the best.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  4%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  3%
 
A Federal Government agency (ATO, Centrelink etc)
  19%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1908

Vote
Do you support the abolition of the Office of the Information Commissioner?