Black Hat: Engineer Cracks 'Secure' TPM Chip



User avatar


Posts: 4270

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Tue Feb 09, 2010 11:45 am

Black Hat: Engineer Cracks 'Secure' TPM Chip

Report from William Jackson of MCP Mag & Government Computer News:

A security engineer who reverse-engineered the family of chips from Infineon Technologies AG that includes its Trusted Platform Module (TPM) implementation showed an audience at this week's Black Hat conference how he cracked the chip and accessed its data.

Using an electron microscope to operate at the nanometer scale and Adobe Photoshop to plan his attack, Christopher Tarnovsky was able to sit on the chip's data bus and "listen" to unencrypted code.

"This takes you somewhere that Infineon says you can't go," said Tarnovsky, who runs Flylogic Engineering and specializes in analyzing semiconductor security. He demonstrated his technique on Tuesday at the conference in Washington, D.C.

Tarnovsky said he has accessed almost all of the code from a TPM chip and also had dumped data from secure licensing chips used in products such as Microsoft's Xbox 360 video game console.

"Nothing inside that device is secure," he said. "I can access all the keys and secrets on the chips." He said he was not attacking Infineon specifically and that chips from other manufacturers might also be vulnerable to physical attacks. "These chips are not as secure as the vendors tell you they are."

Tarnovsky said he had reported his successful attack to Infineon about a month ago but had not heard back from the company. Infineon did not immediately respond to a request for comment. But Tarnovsky said, "Infineon is not happy at all. They know I have broken the device."

The device is the SLE 66PE family of contactless interface microcontrollers. In addition to securing commercial products that require licensed use, they also are used to implement the Trusted Platform Module, a set of specifications from the Trusted Computing Group for implementing cryptography in silicon. The chips can be used to support data protection, communications security, strong authentication, identity management, network access control and nonrepudiation.

The attack is not for the novice. It requires physical access to the chip itself as well as access to a Focused Ion Beam workstation, a type of electron microscope that can see at a much smaller scale than an optical microscope and can manipulate tiny needles less than a micron across, injecting conductors and insulators to rearrange the chips' circuits.

"Don't think that this is easy," Tarnovsky said. He spent six months on the project and still has unanswered questions about the chips' operations and security. The process of reverse-engineering would cost about $200,000 commercially, but he says that now that he has the technique worked out he can access a chip's core and its data in six or seven hours.

He began by buying chips in bulk for pennies apiece to experiment with and break. He stripped each layer off the chip to expose its topography, imaged the layers using optical and electron microscopes, and used Photoshop to layer the images so he could plan his attack through an intact chip.

His target was the processing core, the chip's "central nervous system." Instructions in the core have to run in the clear; information in the rest of the chip is encrypted.

Tarnovsky said the security in the chip, which is both physical and logical, is good.

"I really like them a lot," he said of Infineon. "The security is built in layers. It's like Fort Knox in there," with defenses such as optical sensors that can detect light from optical telescopes.

The first layer of defense is a microscopic wire mesh covering the chip. Breaking the electrical circuits in the mesh would disable the chip, making it useless. Tarnovsky mapped the circuits and was able to plot a way to bridge them so that he could punch holes 3 microns across into the lower strata.

Once inside the core, "I can sit on the data bus and listen," he said. "I can get any piece of information stored on the chip."

Because of its complexity such an attack is not likely to become common soon. But not only is the data on individual chips at risk from a determined attacker, once the manufacturer's code is copied from the chip it could be used to produce counterfeit chips, which also could contain backdoors.

Original story:
http://mcpmag.com/articles/2010/02/03/b ... -chip.aspx



User avatar

Sr. Member
Sr. Member

Posts: 318

Joined: Sun Feb 08, 2009 3:38 pm

Location: 407

Post Mon Feb 15, 2010 7:14 am

Re: Black Hat: Engineer Cracks 'Secure' TPM Chip

As we all know, physical access trumps any and all  counter measures in security.  We may be able to limit our liability, but not eliminate.

Especially if you have l33t hacking tools like an electron microscope and Adobe Photoshop.

On the upside, we can let the Xbox 360 mods commence!


User avatar

Hero Member
Hero Member

Posts: 1718

Joined: Mon Jan 29, 2007 2:59 pm

Post Mon Feb 15, 2010 7:46 am

Re: Black Hat: Engineer Cracks 'Secure' TPM Chip

'l33t tools'... no doubt!  I just wish I was half as intelligent as someone like that, who can look so clearly at that internal security design, and 'punch holes 3 microns across into the lower strata.' 

Makes me happy, at least, that I can look at the software side of it all!  Proof positive that ANY security can be cracked, if the right people, technology and time are available.  If someone can engineer it, then technically, someone else can reverse-engineer (or bypass) it, if they can think the original process through, and circumvent pieces and parts of it all.

Kudos to this guy for his efforts, and showing that it IS doable...
~ hayabusa ~ 

"All men can see these tactics whereby I conquer,
but what none can see is the strategy out of which victory is evolved."
- Sun Tzu, 'The Art of War'

OSCE, OSCP (Former - GPEN, C|EH - both expiring / expired)

Return to Hardware

Who is online

Users browsing this forum: No registered users and 2 guests

Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software