Ion beam used to wiretap secure chips

Powered by SC Magazine
 

Could bypass military-grade security.

A technique has been developed to bypass elaborate physical protections and siphon data off the most secure chips potentially including those used to protect military secrets.

The proof-of-concept technique demonstrated by researchers at Berlin's Technical University and security consultancy IOActive was successfully applied to a low-security Atmel chip commonly used in TiVo video recording devices.

The lazor scanner

But the research team found that their complex and expensive attack could be applied to successfully pry data from highly-secure chips.

The attack used a polishing machine to mill down the silicon on the target chip until it was 30 micrometers thin.

The chip was then placed under a laser microscope fitted with an infrared camera to observe heat emanating from where encryption algorithms were running.

A focused ion-beam was then shot at the chip which dug a series of two micrometer -deep trenches in which wiretap probes were inserted.

Together, the elaborate techniques if bolstered by the use of more expensive equipment not available to the researchers could potentially bypass the most advanced chip security mechanisms.

Such mechanisms included a wire mesh that served as a last line of physical defense by destroying data if it was disturbed.

Due to the cost and sophistication of the attack techniques, only well funded laboratories could realistically make use of it, the researchers said.

However Stony Brook University computer scientist Radu Sion said the work demonstrated that no chip was completely safe from attack.

“The assumption in the software community, including the cryptographic community, is that when you put something on a chip [they] are hard to touch, hard to get to,’ Sion said.

"Things are not as clear-cut as people thought before. There is no tamper-proof chip.”

The work by the university research team of Clemens Helfmeier, Dmitry Nedospasov, Jan Krissler, Christian Boit and Jean-Pierre Seifert along and IO Active's Christopher Tarnovsky will be presented at Berlin's ACM Conference on Computer and Communications Security in November.

Copyright © SC Magazine, Australia


Ion beam used to wiretap secure chips
 
 
 
Top Stories
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
Amazon forced to reboot EC2 to patch Xen bug
Rolling restarts over next week.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1379

Vote