University College London / Enigmabridge / Masaryk University
For the first time, we introduce a high-level architecture that can tolerate multiple, colluding malicious hardware components, and a new approach for managing the risk of compromises in cryptographic hardware modules.
Existing high-assurance systems cannot reliably maintain their security properties in the presence of compromised hardware components. In this work, we challenge this perception and demonstrate how trusted, high-assurance hardware can be built from untrusted and potentially malicious components.
For more information, please refer to our whitepaper or our other publications.Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. 24th ACM Conference on Computer and Communications Security, Dallas, TX, Oct 30th-Nov 3rd 2017.
Vasilios Mavroudis Cryptographic Hardware from Untrusted Components October 2017. [PDF]
Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. arXiv:1709.03817. [PDF]
Vasilios Mavroudis, Dan Cvrcek. Trojan-Tolerant Hardware & Supply Chain Security in Practice. Defcon 25, Las Vegas, US, 27-30 July 2017. [Slides]
Please use the following bibtex entry to cite our work:
@inproceedings{ Mavroudis:2017:TEH:3133956.3133961, author = {Mavroudis, Vasilios and Cerulli, Andrea and Svenda, Petr and Cvrcek, Dan and Klinec, Dusan and Danezis, George}, title = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components}, booktitle = {Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, series = {CCS '17}, year = {2017}, isbn = {978-1-4503-4946-8}, location = {Dallas, Texas, USA}, pages = {1583--1600}, numpages = {18}, url = {http://doi.acm.org/10.1145/3133956.3133961}, doi = {10.1145/3133956.3133961}, acmid = {3133961}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {backdoor-tolerance, cryptographic hardware, hardware trojans, secure architecture}, }
This section includes all supporting software (all released under the MIT license):
Feedback, ideas and source code contributions are very welcome!