Hardware Security Flashcards

1
Q

What is hardware security?

A

Protecting devices from direct tampering, supply chain attacks, and other physical or systemic threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the primary threats in hardware security?

A

Direct physical tampering.
Indirect supply chain tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some hardware security mitigation techniques?

A

User-verifiable hardware.
Tamper-evident and anti-cloning techniques.
Plausible deniability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are passive hardware attacks?

A

Attacks that involve little or no modification to the target system, such as optical or RF side-channel analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are active hardware attacks?

A

Intrusive attacks that manipulate hardware, such as fault injection, glitching, or rowhammering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is fault injection, and what does it achieve?

A

Deliberately causing errors in a device’s operation to leak sensitive data or bypass security checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the rowhammer attack?

A

An attack that exploits electrical interactions between memory rows to flip bits and cause unintended behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are supply chain attacks?

A

Compromising devices during manufacturing or distribution to insert malicious components or tamper with functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name two methods used in supply chain attacks.

A

Substituting components.
Adding hidden chips inside packages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are supply chain attacks hard to detect?

A

Hardware tampering often leaves no visual or immediate functional changes, requiring advanced tools like X-ray or SEM for detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is verifiable hardware?

A

Hardware designed to allow inspection and verification of its components and functionality by end-users or third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can open-source principles aid in hardware security?

A

Peer-reviewed designs can identify vulnerabilities, and open tools can ensure proper implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main challenge in verifying hardware?

A

Complexity, as modern chips have billions of transistors, making comprehensive verification difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What features make devices tamper-evident?

A

Unique identifiers.
Sensitivity to physical stress, temperature, and chemicals.
Durable one-way lock mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an FPGA?

A

Field Programmable Gate Array, a reprogrammable chip used to implement hardware designs securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does an FPGA enhance hardware trust?

A

Enables user-side verification of hardware functionality and design, narrowing the gap between design and use.

17
Q

How do FPGAs mitigate the TOCTOU problem?

A

By allowing users to compile and verify designs directly before use.

18
Q

What is plausible deniability in the context of hardware?

A

Ensuring an adversary cannot prove or disprove the existence of sensitive data.

19
Q

Name two techniques for achieving plausible deniability in devices.

A

Encrypting data to make it indistinguishable from free space.
Avoiding metadata leakage that could reveal encrypted data.

20
Q

What are the limitations of plausible deniability?

A

It diminishes with repeated forensic imaging and cannot guarantee safety against coercion or destruction.

21
Q

What is “ptychographic X-ray imaging”?

A

A non-destructive 3D imaging method for reverse engineering and verifying complex chip designs.

22
Q

Why is silicon difficult to inspect with X-rays?

A

Silicon is relatively transparent to X-rays, and complex designs may require advanced methods like CT scanning.

23
Q

What are the three principles for evidence-based trust in hardware?

A
  1. Complexity is the enemy of verification.
  2. Verify entire systems, not just components.
  3. Empower end-users to verify and seal their hardware.
24
Q

How does social context influence security?

A

Locks and tamper-evident features often rely on social norms and deterrents rather than purely technical measures.