Ion beam used to wiretap secure chips

Powered by SC Magazine
 

Could bypass military-grade security.

A technique has been developed to bypass elaborate physical protections and siphon data off the most secure chips potentially including those used to protect military secrets.

The proof-of-concept technique demonstrated by researchers at Berlin's Technical University and security consultancy IOActive was successfully applied to a low-security Atmel chip commonly used in TiVo video recording devices.

The lazor scanner

But the research team found that their complex and expensive attack could be applied to successfully pry data from highly-secure chips.

The attack used a polishing machine to mill down the silicon on the target chip until it was 30 micrometers thin.

The chip was then placed under a laser microscope fitted with an infrared camera to observe heat emanating from where encryption algorithms were running.

A focused ion-beam was then shot at the chip which dug a series of two micrometer -deep trenches in which wiretap probes were inserted.

Together, the elaborate techniques if bolstered by the use of more expensive equipment not available to the researchers could potentially bypass the most advanced chip security mechanisms.

Such mechanisms included a wire mesh that served as a last line of physical defense by destroying data if it was disturbed.

Due to the cost and sophistication of the attack techniques, only well funded laboratories could realistically make use of it, the researchers said.

However Stony Brook University computer scientist Radu Sion said the work demonstrated that no chip was completely safe from attack.

“The assumption in the software community, including the cryptographic community, is that when you put something on a chip [they] are hard to touch, hard to get to,’ Sion said.

"Things are not as clear-cut as people thought before. There is no tamper-proof chip.”

The work by the university research team of Clemens Helfmeier, Dmitry Nedospasov, Jan Krissler, Christian Boit and Jean-Pierre Seifert along and IO Active's Christopher Tarnovsky will be presented at Berlin's ACM Conference on Computer and Communications Security in November.

Copyright © SC Magazine, Australia


Ion beam used to wiretap secure chips
 
 
 
Top Stories
Westpac committed to core banking plan
[Blog post] Now with leadership.
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1139

Vote