Skip to main content

Unpatchable Hardware Vulnerability 'Starbleed' Bug in FPGA Chips Exposes Critical Devices to Hackers.


A newly discovered unpatchable hardware vulnerability in Xilinx programmable logic products could allow an attacker to break bitstream encryption, and clone intellectual property, change the functionality, and even implant hardware Trojans.
The details of the attacks against Xilinx 7-Series and Virtex-6 Field Programmable Gate Arrays (FPGAs) have been covered in a paper titled "The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs" by a group of academics from the Horst Goertz Institute for IT Security and Max Planck Institute for Cyber Security and Privacy.
"We exploit a design flaw which piecewise leaks the decrypted bitstream," the researchers said. "In the attack, the FPGA is used as a decryption oracle, while only access to a configuration interface is needed. The attack does not require any sophisticated tools and, depending on the target system, can potentially be launched remotely."

The findings will be presented at the USENIX Security Symposium later this year. The researchers said they privately disclosed the flaws to Xilinx on 24 September 2019. The semiconductor giant, in response, has posted a design advisory acknowledging the vulnerability.
"The complexity of this attack is similar to well known, and proven, DPA attacks against these devices and therefore do not weaken their security posture," the company noted in its alert.
Exploiting CBC Mode to Encrypt and Decrypt Arbitrary Blocks
FPGAs are programmable integrated circuits that can be reconfigured in-field to match a desired application or functionality depending on where it's deployed. Due to their high levels of flexibility, FPGAs have been widely used in the development of 5G mobile networks, consumer electronics, data centers, aerospace, and automotive technology,
It's worth noting that Xilinx and Intel (via its Altera acquisition) dominate the FPGA market, with Xilinx alone accounting for nearly 50% of the market share.
As FPGA designs are encoded in bitstreams, a hardware vulnerability of this scale can have severe consequences, the researchers said.
In contrast to other known side-channel and probing attacks against Xilinx and Altera FPGAs, the novel "low-cost" attack aims to recover and manipulate the bitstream by leveraging the configuration interface (such as SelectMAP or JTAG) to read back data from the FPGA device.
As a feature, the "readback" is meant to help verify that the design was correctly downloaded to the device. But in an attempt to protect the design, the bitstream is encrypted (AES-256 in CBC mode) to prevent readbacks on all external ports.
The attack devised by the researchers sets out to manipulate the encrypted bitstream to redirect its decrypted configuration data to a MultiBoot start address register (WBSTAR or Warm Boot Start Address), which allows switching between images on-the-fly for remote updates and load a fallback bitstream with a known good design into the FPGA device.
But given the use of flash memory to store these components, a reset doesn't clear the register's contents. As a consequence, the confidentiality of the bitstream can be broken as follows:
Create a malicious bitstream and a readout bitstream. The malicious bitstream exploits the malleability of the CBC encryption mode to alter the command in the bitstream, which writes data to the WBSTAR configuration register.
Load the malicious bitstream into the FPGA device
An automatic reset of the FPGA happens due to changes made to the bitstream in step (1) but doesn't reset the WBSTAR contents as it's used for the MultiBoot and fallback feature.
Readback the contents of the WBSTAR register using the readout bitstream.
Manually reset the FPGA device to repeat the above steps and recover the entire encrypted bitstream as 32-bit words.
"In summary, the FPGA, if loaded with the encryption key, decrypts the encrypted bitstream and writes it for the attacker to the readable configuration register," the researchers stated.
"Hence, the FPGA is used as a decryption oracle. The fact that only single 32-bit words can be uncovered in each iteration determines the duration of decrypting a whole bitstream: In our experiments, we are able to uncover a complete Kintex-7 XC7K160T bitstream in 3 hours and 42 minutes, for instance."

In the second type of attack, the FPGA can be used to encrypt arbitrary bitstreams — once again taking advantage of the underlying CBC mode — and create a valid message authentication tag (HMAC), thereby breaking the authenticity of the bitstream as well.
According to the researchers, the attacks stem from a pitfall that the data of the encrypted bitstream header is interpreted before it's been verified, thus allowing a malicious bitstream to run on the FPGA's logic fabric.
The Flaw Cannot Be Patched
Considering that the attacks are based on the flaws in the protocol, the researchers noted that "any kind of non-trivial change to the security protocol is not possible without a redesign of the FPGA hardware and is currently not available for 7-Series and Virtex-6 devices."
In addition to recommending hardware developers to subject input data to cryptographic validation and make use of a patchable bitstream encryption engine — both of which are already in place for Xilinx's Zynq-7000, UltraScale, and UltraScale+ devices, a number of countermeasures have been proposed, such as implementing obfuscation schemes or patching the PCB to use FPGA's Revision Select pins to prevent readout from the WBSTAR register.
"We consider this as a severe attack, since (ironically) there is no opportunity to patch the underlying silicon of the cryptographic protocol," the researchers concluded. "We note that the 7-Series have a substantial share of the FPGA market, which makes it even more difficult or impossible to replace these devices."

THN

#osutayusuf

Comments

Popular posts from this blog

UGANDA ELECTORAL COMMISSION TO ELIMINATE NATIONAL IDENTIFICATION CARDS (IDs) FOR 2021 GENERAL ELECTIONS.

The elimination of using National IDs (Ndagamuntu) for the 2021 elections should not have come as a surprise. One would be very NAIVE to think that Bobi Wine has not prepared for this in his Business Plan under the RISK section. It is public knowledge that our EC is not independent.  It is also public knowledge that Military Dictator Yoweri Museveni will never lose an election. What stunned us this morning is when we noticed that on social media, people were mocking Bobi with his "get your Ndagamuntu".  We are on record for saying to all Our readers that the National ID is like Apartheid in South Africa. Students of History would know how those IDs were being used to arrest people, deny them jobs, deny them basic services. Consequently, Bobi was not wrong and will never be wrong on the Ndagamuntu. Except the ones attacking him and mocking him forget that in Uganda, now, no National ID (Ndagamuntu), no service.  If you have not been denied registering your child i...

Here is Why Our Utterances For Praying Jesus And God To Come Liberate Ugandans, May Be Misplaced. This Phrase is like inform of a Letter To Some Categorized Section Of Ugandans.

https://m.facebook.com/yusufosuta/photos/a.1896701010557789/2070383359856219/?type=3 OPEN LETTER TO NRM SUPPORTERS - NATIONAL ROBBERS MOVEMENT. .................................................................................. Last week of March, a friend told me to pray for Uganda.  I told him that he was an Idiot and we have prayed for too long and we are still hungry and sick and Jesus is not coming soon to liberate us. He then ignored the STUPID and sent me a picture we all now know.  It got me totally messed up.  This guy was telling me to pray then sends a picture of men bowing down in blood.  He might have meant guns but I blocked him because his utterances of praying for Uganda were misplaced. I unblocked him 3 weeks later and asked him about praying and assassinations.  His reply "eithrr prayers or guns or both". I hate violence with a passion.  So he is now blocked in like FOREVER. Do you feel safe?  Do not feel safe. Uganda regim...

CAN I CHANGE MY MIND ABOUT THE INHERITANCE I RECEIVED AND ASK FOR SOMETHING ELSE ?.

#iip_updates . #Information_is_Power . Read more here https://informationispowah.blogspot.com/2023/07/can-i-change-my-mind-about-inheritance.html in the link. #we_inform_the_uninformed . Okello lost his wife 20 years ago and decided to only focus on their Mateo, Yona and Yosefu. 20 years later, Okello had 7 acres of land, a successful poultry business, and sinotrucks for hire. Early this year, Okello got a call telling him that one of his trucks knocked a boda boda. Okello decided to rush to see if he could sort it out before police became involved. Unfortunately, he never made it, as he was entering the main road, another trailer rammed into him and killed him instantly.   After Okello had been laid to rest, his sons sat down and divided the property amongst themselves. However, of late, Yosefu the last born has started complaining that he was cheated, and he wants to be given something else because most of the chicken in the chicken business died of a fever.   Can ...