Advertisement

Blog

What Chip Vulnerabilities May Be Lurking in Commercial IT Systems?

While the electronics industry works to improve its supply chain integrity, the need for chip companies to keep some features secret sometimes clashes with the need for more transparency at the OEM — and ultimately the end-user — level.

That’s the case in one of the examples cited in a Gartner report published last fall. (registration required). In this final of three blog posts on the insecurity of the commercial IT supply chain as described in that report, I’ll explain the incident and the broader problem it represents.

Last summer, University of Cambridge PhD candidate Sergei Skorobogatov and fellow research Christopher Woods reported in an academic paper that they had discovered a backdoor in Microsemi/Actel ProASIC3 FPGA chips. The paper said that the researchers had used a technique called pipeline emission analysis to extract a key to the back door.

Military vulnerabilities
According to Skorobogatov:

    If you use this key you can disable the chip or reprogram it at will, even if locked by the user with their own key. This particular chip is prevalent in many systems from weapons, nuclear power plants to public transport. In other words, this backdoor access could be turned into an advanced Stuxnet weapon to attack potentially millions of systems.

The paper caused a flurry of concern because the ProASIC FPGAs are reportedly widely used in military systems, flight control, and industrial and automotive applications. But Microsemi (which acquired Actel in 2010) says that what the researchers found was not a backdoor, but rather an integral part of the chip’s security. In order to access the information — pre-programmed data such as the unique ID of the device and other data necessary for the production, manufacturing, and testing of the device — a hacker would have to break into the chip’s first-line security, or the front door, first, says Paul Ekas, vice president of marketing for SOC products at Microsemi.

He adds that the chip that was the focus of the research paper was an old device — designed eight years ago — and that the company’s latest line of chips has improved, state-of-the-art security features.

Complex and Easy to Hack

Few FPGA customers implement security features on FPGAs, because it is so inconvenient.

Few FPGA customers implement security features on FPGAs, because it is so inconvenient.

Insecurity factor
Nevertheless, few FPGA customers implement security features on FPGAs, because it is so inconvenient, says Ekas. “Very few customers choose to encrypt that bit stream, because it tends to cost money and time, since most FPGAs require a battery backup.” He notes that MicroSemi’s FPGAs use flash and have security features that make implementing security easier.

The OEMs that are most concerned, and most likely to implement the security, he says, are in government and avionics markets. But the Gartner report’s main point was to alert CIOs to the fact that chips in commercial IT systems may not be secure. Indeed, one of its recommendations is that CIOs require their IT suppliers to be transparent about the functions implemented in firmware, programmable logic arrays, and FPGAs. It’s unlikely that OEMs selling into the commercial market are securing the code in the FGPAs used in their designs. And they certainly wouldn’t think to tell IT customers that their products even incorporate such chips.

Even if they did, the FPGA manufacturers hold a lot of this information close to the vest. Any OEM customer that wants to know more about the chip architecture and security features can get the information, but it has to sign an NDA first, says Ekas.

“Our customers want us to be open and transparent with them. They don’t want us to be open and transparent to the whole market.” That’s because releasing this information to the public also releases it to potential attackers, who can then use it to try to discover and exploit vulnerabilities, he says. The FPGA vendors are also protecting their own IP, of course. The problem is, this also means the information will not be passed along to other manufacturers in the supply chain (from disk drive vendor, for example, to server manufacturer), much less to the final user. That leaves IT equipment in corporate America potentially vulnerable.

The other recommendations in the report:

  • If IT equipment suppliers can’t supply information about the functions implemented in programmable chips, buyers could use independent third-party inspection and verification.
  • Buyers should ask the IT supplier whether there are default or hard-coded passwords in the system that allow access to chips.
  • Buyers should ensure that all testing and debugging interfaces in both software and chips are disabled and, if possible, removed from the IT system before it is shipped.

I suspect we’ll be hearing more about this problem in commercial systems, not just in FPGAs and not just in military equipment. As Skorobogatov and Woods say in their research paper, in today’s global semiconductor manufacturing industry “an adversary can introduce Trojans into the design during a stage of fabrication by modifying the mask at a foundry or fab. It can also be present inside third parties’ modules or blocks used in the design.”

Do you think commercial IT equipment is vulnerable to chip-level tampering? Or am I just being paranoid?

Related posts:

8 comments on “What Chip Vulnerabilities May Be Lurking in Commercial IT Systems?

  1. HM
    April 18, 2013

    Its interesting to know that people can hack FPGAs. Doesnt look that simple though. Thought hardware is much difficult to crack then software. But yes counterfeit is a big busniess and when you order in larger quantities there are many chips that can be tampered.

  2. Eric Sivertson
    April 22, 2013

    FPGAs are more vulnerable than most people realize.  Take a look at these two (2) links for more details:

     

    1. FPGA AES DPA Demo: http://www.cryptography.com/technology/dpa/fpga-board-video.html
    2. FPGA Protected Bitstream Vulnerability: http://gcn.com/articles/2011/07/25/fpga-chips-cracked-researchers-dpa.aspx

     

    As you can see, obtaining the cryptographic keys from an FPGA is relatively easy using DPA methods.  On the commercial side of things, you will find many routers using FPGA technology.  So, not only should the military consumers be concerned, but also a large portion of the commerical IP infrastructure.  

  3. t.alex
    April 23, 2013

    FPGA chip itself needs to fetch programmable data from memory to run. Perhaps this data is not encrypted and so it can be hacked. 

  4. Patriot
    April 28, 2014
  5. iankelbly
    May 20, 2014

    This is a good post. This post gives truly quality information and also thank you for sharing your knowledge with us. Keep on posting. –buy facebook photo likes

    http://socialformula.com/

  6. gmk05
    July 12, 2014

    Resources like the one you mentioned here will be very useful to me! I will post a link to this page on my blog rental mobil . I am sure my visitors will find that very useful

  7. Tonywify
    July 19, 2014

    Thanks for the very informative and well structured post. You have some wonderful article writing skills. I just got to know the vulnerabilites of chips used in IT now a days. Even I don't this they exists. Thanks for sharing the info.

    Regards,

    play.google.com

  8. Georgegregory99
    August 9, 2014

    Thanks for letting us know about the chip vulnerabilities as many people or probably hackers try exploit through our databases and I might consider this article as some precautions not to leave some vulnerabilites. Thanks for the share.

    Regards,

    medium.com best web hosting reviews | wordpress.com Moroccan argan oil | vitamin c serum bitly.com | seo in phoenix medium.com | seo in san francisco medium.com

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.