Certification Schemes



Documents pareils
Evaluation, Certification Axes de R&D en protection

Sécurité des systèmes d'informations et communicants dans le médical

Rapport de certification 2002/08

INSTITUT MARITIME DE PREVENTION. For improvement in health and security at work. Created in 1992 Under the aegis of State and the ENIM

Information Security Management Lifecycle of the supplier s relation

Les marchés Security La méthode The markets The approach

EN UNE PAGE PLAN STRATÉGIQUE

Paxton. ins Net2 desktop reader USB

BNP Paribas Personal Finance

La solution idéale de personnalisation interactive sur internet

POLICY: FREE MILK PROGRAM CODE: CS-4

Contrôle d'accès Access control. Notice technique / Technical Manual

Face Recognition Performance: Man vs. Machine

Application Form/ Formulaire de demande

Sagemcom EDI with Suppliers

WEB page builder and server for SCADA applications usable from a WEB navigator

Conditions de l'examen

NOM ENTREPRISE. Document : Plan Qualité Spécifique du Projet / Project Specific Quality Plan


AIDE FINANCIÈRE POUR ATHLÈTES FINANCIAL ASSISTANCE FOR ATHLETES

Editing and managing Systems engineering processes at Snecma

Formation. Mastère Spécialisé en Sécurité des Systèmes Intégrés & Applications. Post-master s degree in Security of Integrated Systems & Applications

The new consumables catalogue from Medisoft is now updated. Please discover this full overview of all our consumables available to you.

Instructions Mozilla Thunderbird Page 1

How to Login to Career Page

Nouveautés printemps 2013

Name of document. Audit Report on the CORTE Quality System: confirmation of the certification (October 2011) Prepared by.

L industrie pharmaceutique et la grippe aviaire

Exemple PLS avec SAS

affichage en français Nom de l'employeur *: Lions Village of Greater Edmonton Society

HAUTE DISPONIBILITÉ DE MACHINE VIRTUELLE AVEC HYPER-V 2012 R2 PARTIE CONFIGURATION OPENVPN SUR PFSENSE

Rountable conference on the revision of meat inspection Presentation of the outcome of the Lyon conference

Visualisation et Analyse de Risque Dynamique pour la Cyber-Défense

Instructions pour mettre à jour un HFFv2 v1.x.yy v2.0.00

Plan. Department of Informatics

Dans une agence de location immobilière...

Tammy: Something exceptional happened today. I met somebody legendary. Tex: Qui as-tu rencontré? Tex: Who did you meet?

Qualité et ERP CLOUD & SECURITY (HACKING) Alireza MOKHTARI. 9/12/2014 Cloud & Security

Préconisations pour une gouvernance efficace de la Manche. Pathways for effective governance of the English Channel

Tom Pertsekos. Sécurité applicative Web : gare aux fraudes et aux pirates!

Acce s aux applications informatiques Supply Chain Fournisseurs

Quatre axes au service de la performance et des mutations Four lines serve the performance and changes

Plateforme Technologique Innovante. Innovation Center for equipment& materials

Ingénierie et gestion des connaissances

Comprendre l impact de l utilisation des réseaux sociaux en entreprise SYNTHESE DES RESULTATS : EUROPE ET FRANCE

UNIVERSITE DE YAOUNDE II

NORME INTERNATIONALE INTERNATIONAL STANDARD. Dispositifs à semiconducteurs Dispositifs discrets. Semiconductor devices Discrete devices

Compléter le formulaire «Demande de participation» et l envoyer aux bureaux de SGC* à l adresse suivante :

CONVENTION DE STAGE TYPE STANDART TRAINING CONTRACT

PLM 2.0 : Mise à niveau et introduction à l'offre version 6 de Dassault systèmes

Présentation par François Keller Fondateur et président de l Institut suisse de brainworking et M. Enga Luye, CEO Belair Biotech

calls.paris-neuroscience.fr Tutoriel pour Candidatures en ligne *** Online Applications Tutorial

GIGABIT PCI DESKTOP ADAPTER DGE-530T. Quick Installation Guide+ Guide d installation+

THÈSE. présentée à TÉLÉCOM PARISTECH. pour obtenir le grade de. DOCTEUR de TÉLÉCOM PARISTECH. Mention Informatique et Réseaux. par.

Le No.1 de l économie d énergie pour patinoires.

Deadline(s): Assignment: in week 8 of block C Exam: in week 7 (oral exam) and in the exam week (written exam) of block D

ISO/IEC Comparatif entre la version 2013 et la version 2005

DOCUMENTATION - FRANCAIS... 2

Tier 1 / Tier 2 relations: Are the roles changing?

Mon Service Public - Case study and Mapping to SAML/Liberty specifications. Gaël Gourmelen - France Telecom 23/04/2007

Notice Technique / Technical Manual

AUDIT COMMITTEE: TERMS OF REFERENCE

Syllabus (English Version see page 4) PROFESSOR. Interdisicplinary Programme (MDEV and MIA)

Université de XY University of XY. Faculté XY Faculty of XY

SAP SNC (Supply Network Collaboration) Web Package. (Français / English) language. Edition 2013 Mars

Stratégie DataCenters Société Générale Enjeux, objectifs et rôle d un partenaire comme Data4

REMOTE DATA ACQUISITION OF EMBEDDED SYSTEMS USING INTERNET TECHNOLOGIES: A ROLE-BASED GENERIC SYSTEM SPECIFICATION

Les systèmes de gestion des actifs immobiliers par Gilles Marchand, Ministère de l'éducation du Québec & Dino Gerbasi, GES Technologies

SMALL CITY COMMERCE (EL PEQUEÑO COMERCIO DE LAS PEQUEÑAS CIUDADES)

La gestion des vulnérabilités par des simulations d'attaques

BILL 203 PROJET DE LOI 203

BELAC 1-04 Rev

Conférence Bales II - Mauritanie. Patrick Le Nôtre. Directeur de la Stratégie - Secteur Finance Solutions risques et Réglementations

Le passé composé. C'est le passé! Tout ça c'est du passé! That's the past! All that's in the past!

0,3YDQGLWVVHFXULW\ FKDOOHQJHV 0$,1²0RELOLW\IRU$OO,31HWZRUNV²0RELOH,3 (XUHVFRP:RUNVKRS %HUOLQ$SULO

ICA Congress, Brisbane 2012 Thème général : Les temps qui changent. La confiance et les archives*

MANAGEMENT SOFTWARE FOR STEEL CONSTRUCTION

THE LAW SOCIETY OF UPPER CANADA BY-LAW 19 [HANDLING OF MONEY AND OTHER PROPERTY] MOTION TO BE MOVED AT THE MEETING OF CONVOCATION ON JANUARY 24, 2002

INSTRUMENTS DE MESURE SOFTWARE. Management software for remote and/or local monitoring networks

I. COORDONNÉES PERSONNELLES / PERSONAL DATA

EU- Luxemburg- WHO Universal Health Coverage Partnership:

ERA-Net Call Smart Cities. CREM, Martigny, 4 décembre 2014 Andreas Eckmanns, Responsable de la recherche, Office Fédéral de l énergie OFEN

Gestion des certificats en Internet Explorer

Improving the breakdown of the Central Credit Register data by category of enterprises

Le MDM (Master Data Management) Pierre angulaire d'une bonne stratégie de management de l'information

PayShield 9000 Présentation générale

PIB : Définition : mesure de l activité économique réalisée à l échelle d une nation sur une période donnée.

Module Title: French 4

PACKZ System Requirements. Version: Version: Copyright 2015, PACKZ Software GmbH. 1

Cours de didactique du français langue étrangère (*) French as a foreign language (*)

Stéphane Lefebvre. CAE s Chief Financial Officer. CAE announces Government of Canada participation in Project Innovate.

COUNCIL OF THE EUROPEAN UNION. Brussels, 18 September 2008 (19.09) (OR. fr) 13156/08 LIMITE PI 53

This is a preview - click here to buy the full publication NORME INTERNATIONALE INTERNATIONAL STAN DARD. Telecontrol equipment and systems

Frequently Asked Questions

POSITION DESCRIPTION DESCRIPTION DE TRAVAIL

INVESTMENT REGULATIONS R In force October 1, RÈGLEMENT SUR LES INVESTISSEMENTS R En vigueur le 1 er octobre 2001

INTRODUCTION A LA CERTIFICATION DE LA SÉCURITÉ DES TECHNOLOGIES DE L INFORMATION. Natalya Robert 23 janvier UPMC

Acronymes et abréviations. Acronymes / Abbréviations. Signification

Restaurant Application Quick Reference Guide

Transcription:

2011 Hardware Security Components: Vulnerabilities, Evaluation and Certification Dr CEA/LETI Alain.merle@cea.fr 1 Certification Schemes n Driven by National Authorities In France: ANSSI n License laboratories Emit Certificates Independent laboratories (ITSEF, CESTIs) Perform the evaluations n n Areas of Licensing Hardware (and embedded software) Software Levels of licensing Semi-formal and formal EAL4/5 or EAL7 Organisme! d accréditation! COFRAC! Organisme de Certification :! A.N.S.S.I.! Accréditation Agrément! Certification CESTI! Centre d Evaluation de la Sécurité! Certificat des Technologies de l Information! Le Schéma Français de Certification 2 1

n Standardized & efficient methodology for security analysis (ISO IS 15408) n International recognition of the certificates n In Europe, mainly used for Integrated Circuits Integrated Circuits with embedded software Smartcards 3 Common Criteria Basic Ideas n Description of the security Justified Security Specifications (The Security target) n Verification of the conformance to the security specifications n Tests (functional and penetration testing) n Verification of the environmental hypothesis 4 2

Smartcards evaluation n Common Criteria, EAL4+ (EAL5+ for the IC) «Top level» evaluations (banking, health, Id) White Box evaluations w Access to the design w Access to the source code w For the conformity checking and the attacks n A table rating the «attack potential» Time, expertise, equipment, knowledge, The card must resist to an attacker with the maximum capabilities w All realistic attacks w In a time compatible with the life time of a product 5 CC: Norm or Open Standard n Widely used for Smartcards n But, heavy adaptations have been necessary to have an efficient process 6 3

Resistance rating Ref: http://www.commoncriteriaportal.org 7 What kind of testing? n Functional (Security functions) Conformance with the security specifications n Attacks Independent vulnerability analysis Challenge: In 3 / 4 months, how to: w Cover all the attack possibilities w Guarantee (estimate) an higher resistance duration? 8 4

Test strategies R&D Potential vulnerabilities Attacks and Potential Vulnerabilities Attacks and Strategies Tests State of the art Add Remove Customize Evaluation tasks Add Remove Customize The evaluation is a tool for optimizing the testing duration: Ø By giving to the evaluator the knowledge the attacker will have to find Ø By enabling the definition of test strategies Ø By enabling a limitation of the testing 9 Requirements for the ITSEFs n Specific competences in Attacks in the licensing area State of the Art (not always published) R&D in Attacks Multi-competences w Cryptography, microelectronic, signal processing, measures, lasers, etc Microelectronics Equipments w MEB, FIB, plasma etching, chemical etching, Security is a constant and fast evolving area w Strong background and followed activities n Reduce uncertainties Quality, Security, Training, etc 10 5

Potential vulnerabilities n Physical (Si modifications) Memories Internal signals Modifications of the IC n Observation: Side Channel Analysis SPA, EMA, DPA, DEMA n Perturbations: Inject faults Exploitation (examples) w IO errors (reading, writing) w Program disruption (jump, skip, change instruction) w Dynamic rewriting of the code Cryptography (DFA) n Attacks on the embedded software Protocols, overflows, errors, 11 1996 2010: Security & Attacks 1996: «Manual» design Firsts APL External clock No internal cyphering 1996 2010 12 6

1996 2009: Security & Attacks 1998: P. Kocher announces DPA 2001: Perturbations: EMA Power gliches DFA 2003: Laser perturbations Memory Dumps 1996 1998 2001 2003 2010 13 1996 2010: Security & Attacks 2006: Laser Cartography RSA Registers RNG Registers DES Registers 1996 1998 2001 2003 2006 2010 14 7

1996 2010: Security & Attacks 2000 Light perturbation 2006 2009 Source Riscure 1996 1998 2001 2003 2006 2010 15 1996 2010: Security & Attacks 1996 1998 2001 2003 2006 2010 16 8

1996 2010: Security & Attacks A 12 years old circuit is now a student exercise 1996 1998 2001 2003 2006 2010 17 And? n Negative view Is it any good reason for the next 10 years to be different from the previous ones? n Positive view Each attack has been efficiently countered (all what is seen is no more to be seen) Resistance level has been dramatically improved Very few new ideas 18 9

To be noticed: n Security / Confidentiality requirements for ITSEFs No example of attacks «transferred» to the public area before counter-measures implemented Few example of attacks developed in the public area before implemented in Labs n Evaluation / Certification A responsible actor for implementing challenging conditions A controlled race between Attacks & Defense 19 Absolute resistance: myth or goal? n Crypto schemes are based on a secret Gaining access to the secret kills the system n Theoretical resistance is also evolving Moore s law of microelectronics DES, TDES, AES, RSA key length, Hash fns n Hardware can t be the perfect & unique solution A Physical object could always be attacked New attacks discovered «every days» w DPA, EMA, DFA, Laser, Questions about the life time w A 12 years old circuit is a student exercise The hypothesis of facing a successful attack must be taken into account 20 10

Trust and Common Criteria n An hardware component can t be broken n A certified IC can t be broken n A certified IC has a resistance at the state of the art n Can I trust a certified component? If I know and understand the limits w What is the state of the art? w Life time of the product Yes Yes ü Yes ü Yes No ü No ü No No 21 Conclusion n «Nobody s perfect». Hardware is a good solution but limits exist Any scheme limited to the resistance of a single component is limited n Evaluation/Certification brings Confidence/Trust n Evaluation/Certification is a limited risk process to create efficient challenging conditions 22 11

Questions? 23 12