2. 2
2
How many people do you recognize here?
Paul Kocher
CRI/Rambus
Miller & Vakasek
IO Active – Jeep Hack
Satoshi Nakamoto ?
Blockchain/ Bitcoin
Edward Snowden
NSA Leaks
Marc Witteman
Founder Riscure
Joan Daemen
Co-Founder AES
Claude Shannon
Father of Information Theory
and modern Cryptography
Adi Shamir
The S from RSA and more
3. 3
Privacy
How Secure is your mobile phone?
Keysight Public
Source: https://www.zdnet.com/article/israeli-military-tricked-into-installing-malware-by-hamas-agents-posing-as-women/
4. 4
Trust
Can you trust your allies?
Source: https://arstechnica.com/tech-policy/2020/02/us-german-intel-owned-swiss-crypto-used-by-dozens-of-countries/
https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/
Keysight Public
5. 5
Piracy and copyright infringement
Have you ever downloaded games, movies, books, music, ….?
Keysight Public
The Pirate Bay
Popcorn Time
Napster
6. 6
Integrity
Can we trust technology?
Keysight Public
Drone exploit Hacking Philips HUE Lamps Smart Card Cloning
Mobile Phone
screen radiation
Aka Tempest
Screaming Channels
7. 7
Safety
Are current Safety standards good enough for Security?
Keysight Public
SAFETY
≠
SECURITY
Jeep Hack Key fob Tesla hack KIA/Hyundai hacking
Toyota RAV4 Outside
ODB access
Connected Smart Meters
8. 8
Hacking tools
Today’s Hardware Hacking is for everyone
Keysight Public
Flipper Zero USB Rubber Duck O.MG Cables
HackRF One
Ubertooth Chip Whisperer & Shouter
Raspberry PI based D.I.Y.
9. 9
Riscure Security Solutions #RSS
We care about Device Security
Keysight Public
• We care about devices that must be secure in a hostile environment
• We serve customers with our security test tools, services, and training
• We develop test methods and tooling
10. 10
How do we help our customers?
Keysight Public
Certification
Training
Products
Break
Test
Security Analyst
Educate
Make
Riscure Security Solutions
Every customer has a different need
12. 12
Core markets
Security Certification
• Chips
• Operating Systems
• Devices
Automotive
• ECU’s
• Complete vehicles testing
• UN155 Type approval
Internet of Things
• Consumer
• Industrial
• Cloud computing
Mobile and electronic payment
• Mobile applications
Keysight Public
13. 13
Key expertise
And many more!
Chip security
• Banking cards, Transport cards and e-Passports
• > 200 chipset evaluations
Connected
devices
• Automotive: > 25 customers > 50 projects
• IoT: > 600 devices
Secure OS
(Trusted
Execution)
• > 100 evaluations for payment, media,
automotive and general certification
Mobile
• > 200 mobile application projects for Payment:
Host Card Emulation and mPOS
Hardware
• Side Channel Analysis (SCA) / Fault Injection (FI)
• PQC, Pre-silicon testing, Deep Learning
Keysight Public
14. 14
• Certification provides access to the market.
• Security testing by an indepent is required, by a scheme controlling this market.
• Riscure provides a wealth of accreditions by such schemes.
Accreditations
Mobile and e-Payments General and Automotive
IoT, cloud computing, media
And many more!
Keysight Public
15. 15
Riscure in Automotive
projects
completed
Source code reviews on chipset and devices.
Architecture & design reviews
Chip security testing Fault
Injection (FI) & Side Channel
Analysis (SCA)
ECU security evaluation complete
vehicles
OEMs, Tier 1s & Tier 2s
Top-10 semiconductor vendors
25+ 50+
automotive
clients
Security consultancy
UN R155/R156 Type Approval
Whole vehicle testing
- A new vehicle goes through penetration test.
- In-field vehicles are checked periodically
Keysight Public
17. 17
Empower your team with essential security knowledge
Academy
Secure Coding
Chip Design & Security
Automotive Security
Secure Boot
Essential FI
Common Criteria
Embedded Systems
Reverse Engineering
Essential SCA
Every organization is different. Riscure
Security Solutions offers multiple
approaches to learning depending on
the needs and goals of your team.
Training formats
• Self-Paced
• Expert-led
• Open Training
Device Security Training
Keysight Public
19. 19
We give color to hardware security labs
Keysight Public
SCA
SCA
20. 20
Attackers frequently use these side channels
1. Time of computation
2. Power consumption (SPA, DPA)
3. EM radiation (EMA)
• Semiconductors use power
• Especially when switching, i.e. when working
• Resulting power profile is related to work being done
• Analyzing power profiles reveals processes & data
What is a side channel?
An unintended interface that leaks information
Keysight Public
22. 22
Modular Turnkey solution
Side Channel Analysis (SCA)
Keysight Public
Target
Oscilloscope
Inspector SCA
Software
Transceiver icWaves Huracan
Failure
Analysis
XYZ Stage
CleanWave
Spider
Power Tracer
for Smartcards
Current
Probe
Current Probe
Active
EM Probes
23. 23
Logical threshold
Power dip while reading data
Voltage
Time
Logical 1
Logical 0
3.3
0.0
1.8
• Semiconductors require environmental
parameters to stay within strict bounds, e.g.
• Voltage
• Frequency
• Going briefly out of bounds may lead to a fault,
and a software malfunction
• Attackers exploit these malfunctions by careful
tuning the fault
Go outside the specs
What is Fault Injection?
Keysight Public
24. 24
Modular Turnkey Solution
Fault Injection (FI)
Inspector FI
Software
Spider VC Glitcher Clock Glitcher
Glitch
Amplifier
High
Power GA EM-FI EM-FI APW
Lasers
Systems
Transceiver icWaves Huracan
Keysight Public
Target
Oscilloscope
25. 25
Inspector PXI security test products
The Next generation
Embedded Security
Testbench
Keysight Public
26. 26
Inspector is migrating from standalone
hardware to an all-in-one Modular Security
Testbench based on Keysight PXIe
Flexible / High-Performance / Future Proof
Keysight Public
Spider
icWaves
Workstation Transceiver
Oscilloscope Huracan
29. 29
Side Channel Analysis (SCA) Fault Injection (FI)
Automation by Inspector software
Keysight Public
Acquisition
Store/load traces
Compression
Alignment
Statistical analysis
Frequency analysis
Filtering
Chaining
Side channel analysis
Modular design
Functions are modules
IDE to create your own
31. 31
Market leader
• Focus on Embedded Security testing products
• Dedicated team of hardware and software developers
• Strong involvement in industry standard schemes
• Secret Weapon
• Our own security test lab
• Prototype development in the lab
• Tools are used in the lab on cutting-edge technology
Why our products?
Keysight Public
32. 32
+300 clients Worldwide
• Semiconductor Manufacturers
• Automotive
• Forensics
• Government agencies
• Defense organizations
• Academia / Universities
• Security Test Labs
Our Clients
Keysight Public
We build hardware and software security test labs for white-box and black-box testing