ROCA was so obvious once the finger was pointed at the problem area that I had friends who reverse engineered it through key analysis and guessed at what the bad code was doing, before the official research paper was published.
-
-
This is an endemic problem in parts of the industry, where half-competent people are the ones doing the audits, while access is denied to those who could actually find problems quicker (but might not work for a big auditing firm).
2 replies 1 retweet 1 like -
Ok I got your point and I don't disagree. I just want to insist on the fact that the solution is more to try to open Secure chips, rather than using broken ones... Telling the opposite is a big fallacy, and I hope it's just a troll
1 reply 0 retweets 0 likes -
Oh, I absolutely would *love* to have open secure ICs. But since that doesn't seem to be happening any time soon, you're left with a choice, and I'm starting to wonder if the open alternative might actually be better given that we can't have both.
1 reply 0 retweets 1 like -
It sounds like a more balanced opinion. There are many issues using broken chips: - no physical security (it's bad for an on-the-field security device) - no way to guarantee the code running in it is actually yours - not possible to implement attestation mechanism ...
1 reply 0 retweets 0 likes -
#1 is the only real problem; if anything, with vendor locked down black boxes you have fewer true attestation capabilities (sure there are mechanisms, but they depend on trusting the vendor). With an open chip it's easy to validate that it is wiped clean and then flash your code.
1 reply 0 retweets 0 likes -
(keep in mind that the use case here is personal tokens and thus personal validation; remote attestation is desirable in other use cases but not really very compelling here)
1 reply 0 retweets 0 likes -
- Firmware upgrade over the air... Having an upgradable FW is a must-have in terms of security. - Integrity of code is also a must-have. You can't sell Yubikey like products and asking your customers to load the code using the JTAG...
1 reply 0 retweets 1 like -
Yubikey does not have firmware upgrade over the air. It's why they keep having to do recalls when they have bugs. This subject is tbh pretty long for Twitter, but suffice it to say that I know people who have though long and hard about this problem and have come up with...
1 reply 0 retweets 4 likes -
... excellent schemes that allow end-user attestation and are still user friendly while providing better attestation guarantees than any black-box secure element ever will. It's a very different way of thinking, where you do *not* have to trust your vendor.
1 reply 0 retweets 2 likes
In fact some approaches go as far as thinking about how to mitigate the chance of silicon backdoors. One that I've seen is using FPGAs and recompiling and randomizing the layout for every end user. It's practically impossible to backdoor an FPGA generically like that.
-
-
None of this precludes end-user friendliness, it can be as simple as plugging in the blank device and double clicking on an initial flasher, while still allowing power users to perform detailed audits on what is going on.
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.