Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> it protects the data by immediately wiping internal storage of all key material.

Yeah, so how, exactly, do they wipe their data? Is it a firmware process? What if they are unpowered as they are tampered?

Or is the media attached in such a way that physically removing it would damage it physically?



A common HSM approach is to keep the key material in battery-backed SRAM so it evaporates when unpowered or tampered. The single-chip solution used in smartphones probably has no budget for extra parts just for key security, so the key will be fixed and stored in processor antifuses. You theoretically could get at them with a scanning electron microscope, but only with extreme difficulty and no guarantee of success on a single device. And it's a destructive process.

http://www.microsemi.com/document-portal/doc_view/132857-ove... : see page 5. That's Microsemi but the general approach of Apple/TSMC/Samsung is likely to be the same.


do you have any idea of what success rate you would be looking at there? 99% 50% 10%?


I don't know, but evidently the manufacturers think it's "low enough". This is definitely the kind of security which is about increasing the resource spend per attack rather than guaranteeing impossibility.


All of the sibling comments have great explanations of common processes, but one is missing: a metal mesh as part of the top of the CPU silicon. It's talked about a little bit here: http://users.encs.concordia.ca/~clark/courses/1501-6150/scri... Essentially, there's a "trap" on the top of the chip that resets the memory if touched by a conductive probe of any kind. I don't know the specifics of how you'd construct such a thing, but it seems like it wouldn't be too complicated to do.


Electronic fuses and secure (fusing) EEPROMs are not uncommon in HSMs, but I honestly don't know what Apple is using.


Yes, my question exactly. I know one of the countermeasures devices like the RSA tokens use is to fill the body of the device with plastic or resin to make it really hard to pull apart, but I'm curious how it works for a microprocessor.


You might be interested in this old BlackHat presentation by Christopher Tarnovsky: https://www.blackhat.com/presentations/bh-europe-08/Tarnovsk...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: