29
FIB User Group, Washington DC, USA Valery Ray [email protected] PBS&T FREUD FREUD Applications of FIB Applications of FIB Invasive FIB Attacks and Invasive FIB Attacks and Countermeasures in Hardware Security Countermeasures in Hardware Security Devices Devices

FIB User Group, Washington DC, USA Valery Ray [email protected] PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

Embed Size (px)

Citation preview

Page 1: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

FIB User Group, Washington DC, USA

Valery Ray

[email protected]

PBS&T

FREUDFREUD Applications of FIBApplications of FIB

Invasive FIB Attacks and Countermeasures in Invasive FIB Attacks and Countermeasures in Hardware Security DevicesHardware Security Devices

Page 2: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 2

F R E U DF R E U D

FFunctional unctional RReverse everse EEngineering of ngineering of UUndocumented ndocumented DDevicesevices© ©

Extraction of functional codes, Extraction of functional codes, algorithms, data, and keys from algorithms, data, and keys from

secured hardwaresecured hardware

Page 3: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 3

OutlineOutline

Targeted Devices and ApplicationsTargeted Devices and Applications

Workflow of FIB “invasion”, challenges and tricksWorkflow of FIB “invasion”, challenges and tricks

Signal extraction and injectionSignal extraction and injection

Limitations of FIB instrumentationLimitations of FIB instrumentation

Countermeasures against FIB methodsCountermeasures against FIB methods

Page 4: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 4

Typical Targeted Devices:Typical Targeted Devices:μμC in C in Distributed Security and Encryption ApplicationsDistributed Security and Encryption Applications

Page 5: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 5

Typical Targeted Devices:Typical Targeted Devices:μμC in C in Distributed Security and Encryption ApplicationsDistributed Security and Encryption Applications

Page 6: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 6

Workflow of FIB “Invasion”Workflow of FIB “Invasion”

Navigation on undocumented secure devicesNavigation on undocumented secure devices

Capturing layout and localizing nodesCapturing layout and localizing nodes

Bypassing protective shieldsBypassing protective shields

Making contacts, extracting data, injecting signalsMaking contacts, extracting data, injecting signals

Page 7: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 7

Navigation on Secure DevicesNavigation on Secure Devices

Shields prevent direct navigation with opticsShields prevent direct navigation with optics

Have to use sacrificial device to localize nodesHave to use sacrificial device to localize nodes

Two steps of localization – coarse and preciseTwo steps of localization – coarse and precise

Dual positioning: coordinates and local referenceDual positioning: coordinates and local reference

Shield images © Christopher Tarnovsky Shield images © Christopher Tarnovsky www.flylogic.netwww.flylogic.net

Page 8: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 8

Coarse Localization on Sacrificial Device (s)Coarse Localization on Sacrificial Device (s)

Remove shield (wet chemistry or RIE)Remove shield (wet chemistry or RIE)

Scan device under Optical Microscope, stitch Scan device under Optical Microscope, stitch mosaic bitmap, locate nodes, define coordinatesmosaic bitmap, locate nodes, define coordinates

Establish references for coordinate conversionEstablish references for coordinate conversion

Convert bitmap coordinates to FIB stage positionConvert bitmap coordinates to FIB stage position

Page 9: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 9

Layout Capture and Node Localization Layout Capture and Node Localization

Alignment Alignment ReferenceReference

Targeted Targeted NodeNode

Stitched mosaic gives bitmap Stitched mosaic gives bitmap layout of the device for layout of the device for coordinate navigation:coordinate navigation:

X / Y position of pixel is a X / Y position of pixel is a bitmap coordinate!bitmap coordinate!

Page 10: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 10

References and Nodes in FIBReferences and Nodes in FIB

Use alignment references Use alignment references for coarse coordinate for coarse coordinate

navigation on sacrificial navigation on sacrificial devicedevice

Then remove dielectric and Then remove dielectric and capture precise position of capture precise position of

nodenode

Page 11: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 11

Navigation with Local AlignmentNavigation with Local Alignment

Accuracy of FIB stage is limited – how to Accuracy of FIB stage is limited – how to navigate on small-linewidth devices?navigate on small-linewidth devices?

Use coordinates for coarse navigationUse coordinates for coarse navigation

Use protective shield as your local reference!Use protective shield as your local reference!

Try to make contacts in between shield lines, Try to make contacts in between shield lines, if impossible then bypass the shieldif impossible then bypass the shield

Page 12: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 12

Bypassing ShieldBypassing Shield Bypass entire shieldBypass entire shield

» Best for analog shields, works for some digitalBest for analog shields, works for some digital» Takes 30 to 60 min. of FIB time per deviceTakes 30 to 60 min. of FIB time per device» Often need follow-up by non-FIB techniquesOften need follow-up by non-FIB techniques» Shield can be removed to speed up further workShield can be removed to speed up further work

Bypass protective shield locallyBypass protective shield locally» Works on analog and digital shieldsWorks on analog and digital shields» On <200nm devices 2 – 3 shield lines may need On <200nm devices 2 – 3 shield lines may need

bypassing to clear space for each contactbypassing to clear space for each contact» Takes 30 to 120 min. of FIB time per bypassTakes 30 to 120 min. of FIB time per bypass

Page 13: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 13

Disabling ShieldDisabling Shield

Disable shield control circuitryDisable shield control circuitry

» Requires detailed analysis of layoutRequires detailed analysis of layout

» Simulate “OK” shield on input of test circuitrySimulate “OK” shield on input of test circuitry

» Cut output of charge pump – disable flash erase!Cut output of charge pump – disable flash erase!

» Cut “security interrupt” outputs, tie to “1” or “0”Cut “security interrupt” outputs, tie to “1” or “0”

Page 14: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 14

Making “Large” Contacts: Making “Large” Contacts: Direct Line ProbingDirect Line Probing

FIB Image of bus opening FIB Image of bus opening

© Christopher Tarnovsky © Christopher Tarnovsky www.flylogic.netwww.flylogic.net

On devices with On devices with spacious layout and spacious layout and line-width line-width ≥≥ 350nm 350nm direct probing of direct probing of internal nodes may internal nodes may be possible.be possible.

Page 15: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 15

Straight Sputter

Basic GAE

Making Small Contacts: Making Small Contacts: High Aspect Ratio MillingHigh Aspect Ratio Milling

Optimized GAE

Page 16: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 16

Making Small Contacts: Making Small Contacts: High Aspect Ratio Milling ThroughputHigh Aspect Ratio Milling Throughput

0

1

2

3

4

5

6

7

8

0.5 0.4 0.3 0.2

0:00

2:24

4:48

7:12

9:36

12:00

14:24

16:48

19:12

21:36

Penta Dose Beehive DosePenta Time Beehive Time

Dose Dose nCnC

Time Time min.min.

Contact, Contact, μμmm

All contacts are All contacts are 55μμm deepm deep

Page 17: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 17

Making Small Contacts: Making Small Contacts: High Aspect Ratio Endpointing by ImageHigh Aspect Ratio Endpointing by Image

0

2

4

6

8

10

12

14

16

1 6 11 16 21 26 31 36 41 46 51 56 61 66 71 76 81 86 91 96

0

2

4

6

8

10

12

14

16

Full Integration Spatially Filtered

Integrated Endpoint

Filtered Endpoint x2 S/N Improvement

Integration WindowIntegration Window

Spatial FilteringSpatial Filtering

Filter Area

Page 18: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 18

Making Small Contacts: Making Small Contacts: High Aspect Ratio Endpointing by ImageHigh Aspect Ratio Endpointing by Image

0

50

100

150

200

250

1 6 11 16 21 26 31 36 41 46 51 56 61 66 71 76 81 86 91 96

0

50

100

150

200

250

Full Integration Spatially Filtered

Integration WindowIntegration Window

Spatial FilteringSpatial Filtering

Filter Area

Page 19: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 19

40 fA p-p noise

Image Endpoint

“Aftermarket” Sample Current Endpoint

Making Small Contacts: Making Small Contacts: High Aspect Ratio Endpointing by CurrentHigh Aspect Ratio Endpointing by Current

Page 20: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 20

Making Small Contacts: Making Small Contacts: High Aspect Ratio DepositionHigh Aspect Ratio Deposition

Page 21: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 21

Making Contacts and PadsMaking Contacts and Pads

HAR vias HAR vias connecting connecting

to the nodesto the nodes

Clean Clean overspray of overspray of metal depometal depo

Contact pads for probingContact pads for probing

Page 22: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 22

Data ExtractionData Extraction

Connect to data acquisition equipment by Connect to data acquisition equipment by microprobingmicroprobing

Ensure proper buffering, internal nodes were Ensure proper buffering, internal nodes were not designed to drive 100pF cablenot designed to drive 100pF cable

Use ultra-low capacitance buffers for glitch Use ultra-low capacitance buffers for glitch recovery and jittered clock reconstructionrecovery and jittered clock reconstruction

Page 23: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 23

Filter, Align, and Convert to HEX CodeFilter, Align, and Convert to HEX Code

Page 24: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 24

Disassemble, decompile, and Disassemble, decompile, and make yourself at home make yourself at home

Page 25: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 25

Signal injectionSignal injection

Injection of impulses into data bus can alter execution of Injection of impulses into data bus can alter execution of embedded codeembedded code

Basic application: disruption of “End Of Loop” command Basic application: disruption of “End Of Loop” command in Answer To Reset (ATR) function of smartcard in Answer To Reset (ATR) function of smartcard microcontrollers may cause extraction of data memory microcontrollers may cause extraction of data memory

Suitable injection buffers are not available from OEMs of Suitable injection buffers are not available from OEMs of pattern generators or otherwise, must DIYpattern generators or otherwise, must DIY

Page 26: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 26

Limitations of existing FIB technologyLimitations of existing FIB technology

Accuracy of navigationAccuracy of navigation

» Targeting nodes by only the coordinates on devices Targeting nodes by only the coordinates on devices with linewidth < 200nm is unreliable on most FIBswith linewidth < 200nm is unreliable on most FIBs

Aspect ratio of contactsAspect ratio of contacts

» Endpoint of milling on contacts with 20:1 depth/width Endpoint of milling on contacts with 20:1 depth/width may require “aftermarket” upgradesmay require “aftermarket” upgrades

Linewidth (technology node) limitationsLinewidth (technology node) limitations

» Making multiple deep contacts smaller then 250 nm Making multiple deep contacts smaller then 250 nm is esoteric art, takes very dedicated operator…is esoteric art, takes very dedicated operator…

Page 27: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 27

Countermeasures against FIBCountermeasures against FIB FIB attacks can be made uneconomical for casual FIB access:FIB attacks can be made uneconomical for casual FIB access:

» Planarise devices and use small linewidth technologyPlanarise devices and use small linewidth technology

» Thick copper plane combined with active shields is difficult to cutThick copper plane combined with active shields is difficult to cut

» Use Liquid Crystal Polymer for encapsulation – hard to removeUse Liquid Crystal Polymer for encapsulation – hard to remove

» Use combination of analog and digital shields: bypass is difficultUse combination of analog and digital shields: bypass is difficult

» Introduce “position jitter” to shield layer on lithography step to Introduce “position jitter” to shield layer on lithography step to prevent local referencing for navigationprevent local referencing for navigation

» Orient Orient straightstraight shield lines at 45 degrees angle to the layout shield lines at 45 degrees angle to the layout

Page 28: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

04/20/23 FIB User Group, Washington DC, USA 28

SummarySummary FREUD by FIB methods can’t be prevented, but can be FREUD by FIB methods can’t be prevented, but can be

made too expensive for casual accessmade too expensive for casual access

Basic countermeasures are relatively simple in Basic countermeasures are relatively simple in manufacturing – planarisation of devices, more manufacturing – planarisation of devices, more sophisticated active shieldssophisticated active shields

Advanced countermeasures become viable as cost of IC Advanced countermeasures become viable as cost of IC manufacturing is reduced: active double-shielding, LCP manufacturing is reduced: active double-shielding, LCP encapsulation, 45 degrees shield-to-layout orientation encapsulation, 45 degrees shield-to-layout orientation and shield position “jittering”and shield position “jittering”

Page 29: FIB User Group, Washington DC, USA Valery Ray vray@partbeamsystech.com PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware

FIB User Group, Washington DC, USA

www.partbeamsystech.comwww.partbeamsystech.com