-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Thoughts on current trusted hardware core problems #2
Comments
For Suppose we have a way that we can inspect whether a chip was manufactured according to the specification, but doing so is destructive, either because it could leak the internal secrets or because the chip would just be unusable after. Furthermore, suppose this could be carried out by a public process, like a setup ceremony, whether the chip is analyzed in plain view / with lots of witnesses. What an anonymous node operator could do is buy 40 CPUs (i'm not joking, hear me out), and commit to an enclave identity on each of them. Using a beacon lottery, e.g. a bitcoin block, randomly select 30 of the 40 to "open." These 30 are shipped to the analysis lab / public ceremony site. If all 30 of the "opened" CPUs pass inspection, then we have high probability that among the remaining 10 that we didn't open, at least say 9/10 of them are good too. This does not solve the problem of whether it's possible to inspect a piece of hardware and see if it's compromised. It's also clearly wasteful and involves a complex "trusted setup ceremony." But, it does sidestep the manufacturer being the root of trust. |
Logic Encryption in the context of Open Source Hardware DesignsRegarding
Resourcehttps://www.ice.rwth-aachen.de/publications/publication/sisejkovicETS2019/ |
Goal: Security through Physics
Current challenges facing trusted hardware:
Concern 1: Proof of Correct Manufacturing for an Open Source Hardware Specification Design
For concern 1 above, initiatives like OpenTitan + Keystone Enclaves, and more recently Caliptra, address the concern partially.
A while ago, when looking into this, I came across https://hensoldt-cyber.com/mig-v/, but I cannot find a more detailed description right now.
From what I recall the gist was that they could provide a "proof of manufacturing" to make sure that a chip had been manufactured as per a given specification. This may be a somewhat standard & common practice for highly critical applications (e.g. military), but may be challenging for chips with nano-scale components.
Concern 2: Proof of No-Leakage of Root Key at Manufacturing Time
For concern 2 above, perhaps PUFs? I don't enough about it. Do PUFs require some kind of initial measurement that must be kept secret?
Hence, if I understood correctly, PUFs would pose the problem that "someone" must know the measurement, or some information about it, and must safeguard it from attackers, and consequentially the protector of that measurement data becomes a trusted party, which is what we (or I at least) wish to avoid.
Concern 3: Proof of Physical Attacks Resistance
For concern 3 above, I feel it is the most challenging problem. Perhaps PUFs again?
It seems that PUFs can be attacked, especially via machine learning techniques. But perhaps these ML attacks can somehow be mitigated, but I don't know how.
As an aside there is a line of research on quantum PUFs that aims to address the limitations of PUFs in the classical (physics) setting. e.g. https://arxiv.org/abs/1910.02126
The text was updated successfully, but these errors were encountered: