Tamper evident labels or expensive shiny stickers? How can tamper evident labels and testing be improved to better detect physical attacks. (C20a)
Hardware modules need to be able to both prevent and detect attempts to physically compromise sensitive information. One of the most common methods of detection is the use of tamper evident labels that are installed to prevent access to the module without clear signs of tampering. However, these labels are not perfect. With enough time and practice using only the tools outlined in the CMVP Management Manual, most of the labels can be removed and reapplied without clear signs of tampering. If these labels are not effective, they could provide a false sense of security and fail to detect physical attacks. This talk will discuss ways in which the standard can be improved to more clearly specify the testing requirements of tamper evident labels, and the methods vendors can use to increase the chance of tamper detection when using tamper evident labels.