Download - Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

Transcript
Page 1: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

HUAWEI TECHNOLOGIES CO., LTD.

Enhancing Remote Healthiness Attestation

for Constrained IoT DevicesY. Jia, B. Liu, W. Jiang, B. Wu, C. Wang

IEEE ICNP 2020

Madrid, Spain, October 13-16, 2020

Page 2: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

IoT Devices are keeping losing control…

IoT devices remain vulnerable…

Hackers are lunching DDoS with IoT devices…

Mirai attacks…

Peak 1.7 Tbps

IoT Devices

Page 3: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

Reasons behind the constantly vulnerabilities

Constrained Resources…Market

Shaping

Hacking

Hacker UnaffordableSecurity mechanisms

IoT Hacked!

Page 4: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

Given that IoT devices are inevitably vulnerable, the question goes to:

How could we timely identify hacked IoT devices?

Remote Attestation

Page 5: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

Universal Remote Attestation

StartedPower off

BOOTUP

Trusted boot mechanism

Credentials

Endorsed by Trusted Module

STEP 1

STEP 2

Trusted Module

Running

IP Network Channel

• Built by the manufacturer• Trusted by the Authorized Verifier• All in an out-of-band manner

Pull the CredentialsWith the Trusted Module endorsement

Trusted Boot

Remote attestation

Page 6: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

A dedicated Trust Module is way too heavy/expensive…

Could it be evolved for the constrained IoTs?

DICE(Device Identifier Composition Engine)

Page 7: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

The DICE(Device Identifier Composition Engine) Proposal

• Initially proposed by Microsoft

• Standardized by

• standardize 2 specifications of the DICE-based remote attestation

symmetric crypto DICE asymmetric crypto DICE① ②

Standardized by 2020 Standardized by 2018

Page 8: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

DICE with the Asymmetric crypto

Device Side

Verifier Side

DICE Engine[SK*]

Layer 0[SK0]

Layer 1[SK1]

Layer 2[SK2]

Layer n[SKn]

… …

Signed by SK*

Certificate 0PK0

Signed by SK0

Certificate 1PK1

Signed by SK1

Certificate 2PK2

Signed by SKn-1

Certificate nPKn

… …Hash(L0) Hash(L1) Hash(L2) Hash(Ln)

Signed by SK*

Certificate 0PK0

Signed by SK0

Certificate 1PK1

Signed by SK1

Certificate 2PK2

Signed by SKn-1

Certificate nPKn

… …Hash(L0) Hash(L1) Hash(L2) Hash(Ln)

Signed by SKCA

Certificate IDevIDPK*

DTLS Handshake [Authentication]

Database H0 | H1 | H2 | H3 | … | Hn

BOOTUP

Signed by SKCA

Certificate ROOTPKCA

Prerequisites

• DICE Engine is developed and installed by the manufacturer;

• The source code of the DICE Engine too tiny to be hacked;

• DICE Engine is unconditionally trusted by the Verifier;

The higher the layer is, the more functions and attacking surface there will be.Bootup layer by layer

Design Key:

• DICE Engine stores a SK(private key)/PK(public key) pair for the endorsement;

• DICE Engine will be shut down immediately once layer 0 booted up;

• The short running interval guarantees that the SK(private key) is only readable for the DICE Engine itself, and thus inaccessible by any other layers;

The validation is based on the certificate-chain

Page 9: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

DICE with the Symmetric crypto

ID PSK*

DICE

UDS*… …

Secret0=HMAC(UDS, H(L0))

Layer 0

Secret 0

Secret1=HMAC(Secret0, H(L1))

PSK=KDF(Secretn)

Layer 1

Secret 1

Layer 2

Secret 2

Layer n

Secret n

Layer n-1

Secret n-1

Secret2=HMAC(Secret1, H(L2))

Secret3=HMAC(Secret2, H(L3))

Secretn=HMAC(Secretn-1, H(Ln))

Database

H0 | H1 | H2 | H3 | … | Hn

Database

UDS

DTLS Handshake [Authentication]

BOOTUP

ID Firmware Version

PSK

Device Side

Verifier Side

Key Points

• UDS: Unique Device Secret --- A Symmetric key

• The UDS is shared with and trusted by verifiers

The validation is based on the Hash-chain

The design principles are all the same as the Asymmetric crypto based DICE

The Algorithm is the same as the device boot up

Algorithm

Firmware Version

ConsistencyValidation

Page 10: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

NEVERTHELESS

Replay Attacks are behind DICE…

Page 11: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

CredentialsH323CD87LKUE7BGH…

Unconstrained IoT Devices(Powered)

Constrained IoT Devices(Battery)

e.g. TEE

Credentials7LK5UE27B5GHFEG3Y…

Steal the credential

By access devices physical or remotely

NOTE:DICE DO NOT offer the capability of the secure storage

Impractical

Possible

Hardware Level Protection

Software Level Protection

Threat: steal the credentials and then replay…

Replay… The credential is static…Once stolenthe replay attacks survives…

Page 12: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

DICE+: Design Consideration

Direction 1:Replay attack resilience

Direction 2:adaptive for the constrained IoT Devices

Direction 3:Fine-grained firmware attestation

Secure

Light-weight

Accuracy

DICE

DICE+

UPGRADE…

Main Consideration

Page 13: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

Identifying the replay...

Static Dynamic

Convert the Credential from STATIC to DYNAMIC !

SEED

Nonce Counter Timestamp

Page 14: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

DICE+: Design Details Evolution from the Symmetric crypto DICE

UDS KEY0

… …

KEY0=HMAC(UDS, CNT)

Secret0=HMAC(LUDS, H(L0))

Secret0

Layer 1

KEY1

KEY1=H(KEY0)

Secret1

Secret1=HMAC(KEY0, H(L1))

KEYn

Secretn=HMAC(KEYn-1*, H(Ln))

Secretn

BOOT

… …

PSK=H(D)

KEYn=H(KEYn-1)

CNT+1 Every time bootup

D = (Secret0, Secret1, Secret2, … , Secretn)

CNT

DTLS Handshake [Authentication]Device Side

Verifier Side

Algorithm PSK*

Database

H0 | H1 | H2 | H3 | … | Hn

Database

UDS

ID Firmware Version

PSK

The Algorithm is the same as the device boot up

DICE Layer 0

D* D

ID

Firmware Version

ConsistencyValidation

• Seed involved: A counter is introduced in the DICE engine

Layer n

KEYn CNT

MAIN CHANGES

• Symmetric crypto: remain the extreme light-weight overhead

• New algorithm: A parameter is introduced in every layer boot up

OTHER OPTIMIZATIONS

Page 15: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

CHALLENGE 2:Computationally costly

• Asymmetric crypto computation consumes energy

• Certificate-chain transfer consumes energy

CHALLENGE 1:Replay Attack

• The static credentials are easy to replay…

CHALLENGE 3:Coarse-grained attestation

• Verifiers are unable to identify the specific hacked layer

UPDATE 2:Extreme constrained IoT

1. energy consumptions reduce 1000x

2. chip size for security area can reduce ~60%

UPDATE 3:Hacked Layer Identification

• Verifiers are able to identify in which layer the IoT devices

have been hacked.

UPDATE 1:Resilient for Replay

• Verifiers can adjust the period of the validity of the seed

• Verifiers is able to identify the hacked devices that have

been imitated by the replay attacks.

DICE[Asymmetric]

DICE+

Conclusion: What DICE+ Improve?

DICE[Symmetric]

Page 16: Enhancing Remote Healthiness Attestation for Constrained ...UPDATE 2:Extreme constrained IoT 1. energy consumptions reduce 1000x 2. chip size for security area can reduce ~60% UPDATE

HUAWEI TECHNOLOGIES CO., LTD.

THANKS!

IEEE ICNP 2020

Madrid, Spain, October 13-16, 2020