Securing a modern SoC is not easy, no software can fix a TEE issue when a chip does not provide enough isolation on hardware level.
-
-
Replying to @0xABD @AndreaBarisani
Most HSMs that matter have long ago adopted an “FPGA in a tamper-proof metal box” approach, but that is not a silver bullet
1 reply 0 retweets 2 likes -
Replying to @0xABD @AndreaBarisani
PKI key generation requires power, entropy, and trusted isolation well suited for “FPGA in a safe” model, as prescribed by authorities
1 reply 0 retweets 1 like -
Replying to @0xABD @AndreaBarisani
Smartcards were never that good at PRNG nor asymmetric key generation, but that does not mean they have to be abandoned in favor of SoC’s
1 reply 0 retweets 1 like -
Replying to @0xABD @AndreaBarisani
Smartcards present a reduced attack surface and formidable countermeasures against SCA and FI. SoC world is a dumpster fire in comparison
1 reply 1 retweet 2 likes -
Replying to @0xABD
I'd take a larger, but upgradable, attack surface over a smaller one which can only be replaced by physical means, any day of the year.
1 reply 0 retweets 0 likes -
Replying to @AndreaBarisani @0xABD
Also, side channels and FI are not a relevant threat in a wide variety of scenarios and can anyway be accounted for in SoC running firmware.
2 replies 0 retweets 0 likes -
Replying to @AndreaBarisani
Unfortunately, with the complexity of modern SoC’s __everything__ on the die can be a remote SCA or FI vector, see CLKSCREW, etc.
1 reply 0 retweets 0 likes -
Replying to @0xABD
With the correct code failsafes these can be detected and prevented or made extremely hard, in the safety world this is routine.
3 replies 0 retweets 0 likes -
Replying to @AndreaBarisani @0xABD
We demonstrated (@
#hwio17 & FDTC) a FI attack that yields code exec and entirely bypasses FI mitigations in SW, including failsafe checks.2 replies 0 retweets 3 likes
I am well aware of your (spectacular) research :), but I would still argue that for most use cases a smartcard is not intrinsically better.
-
-
Replying to @AndreaBarisani @0xABD
On that point (& many others) I agree with you. It boils down on the threat model and the kind of attacks/attackers you're defending from.
0 replies 1 retweet 4 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.