SMART SECURITY MANAGEMENT IN SECURE DEVICES - Mines Saint-Étienne Accéder directement au contenu
Communication Dans Un Congrès Année : 2015

SMART SECURITY MANAGEMENT IN SECURE DEVICES

Résumé

Among other threats, secure components are subjected to physical attacks whose aim is to recover the secret information they store. Most of the work carried out to protect these components generally consists in developing protections (or countermeasures) taken one by one. But this “countermeasure-centered” approach drastically decreases the performance of the chip in terms of power, speed and availability. In order to overcome this limitation, we propose a complementary approach: smart dynamic management of the whole set of countermeasures embedded in the component. Three main specifications for such management are required in a real world application (for example, a conditional access system for Pay-TV): it has to provide capabilities for the chip to distinguish between attacks and normal use cases (without the help of a human being and in a robust but versatile way); it also has to be based on mechanisms which dynamically find a trade-off between security and performance; all these mecanisms have to formalized in a way which is clearly understandable by the designer. In this article, a prototype which enables such security management is described. The solution is based on a double-processor architecture: one processor embeds a representative set of countermeasures (and mechanisms to define their parameters) and executes the application code. The second processor, on the same chip, applies a given security strategy, but without requesting sensitive data from the first processor. The chosen strategy is based on fuzzy logic reasoning to enable the designer to describe, using a fairly simple formalism, both the attack paths and the normal use cases. A proof of concept has been proposed for the smart card part of a conditional access for Pay-TV, but it could easily be fine-tuned for other applications.
Fichier principal
Vignette du fichier
SOS.pdf (371.59 Ko) Télécharger le fichier
2015_09_16_12-10_S0S_proofs_s.pdf (1.12 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

emse-01232670 , version 1 (23-11-2015)

Identifiants

  • HAL Id : emse-01232670 , version 1

Citer

Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, et al.. SMART SECURITY MANAGEMENT IN SECURE DEVICES. PROOFS: Security Proofs for Embedded Systems, Sep 2015, Saint-Malo, France. ⟨emse-01232670⟩
258 Consultations
573 Téléchargements

Partager

Gmail Facebook X LinkedIn More