BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect

被引:1
|
作者
Rodrigues, Cristiano [1 ]
Oliveira, Daniel [1 ]
Pinto, Sandro [1 ]
机构
[1] Univ Minho, Ctr ALGORITMI LASI, Braga, Portugal
关键词
Side-Channels; Microarchitecture; Bus; Microcontrollers; TEE; TrustZone-M;
D O I
10.1109/SP54263.2024.00062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spectre and Meltdown have pushed the research community toward an otherwise-unavailable understanding of the security implications of processors' microarchitecture. Notwithstanding, research efforts have concentrated on highend processors (e.g., Intel, AMD, Arm Cortex-A), and very little has been done for microcontrollers (MCU) that power billions of small embedded and IoT devices. In this paper, we present BUSted. BUSted is a novel side-channel attack that explores the side effects of the MCU bus interconnect arbitration logic to bypass security guarantees enforced by memory protection primitives. Side-channel attacks on MCUs pose incremental and unforeseen challenges, which are strictly tied to the resource-constrained nature of these systems (e.g., single-core CPU, stateless bus). We devise a unique approach that relies on the concept of hardware gadgets. We present practical attacks on state-of-the-art Armv8-M MCUs with TrustZone-M, running the Trusted Firmware-M (TF-M). In contrast to the Nemesis attack, our attack is practical on Arm Cortex-M MCUs, and our findings suggest that it can scale across the full MCU spectrum.
引用
收藏
页码:3679 / 3696
页数:18
相关论文
共 50 条
  • [21] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [22] MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling
    Bognar, Marton
    Winderix, Hans
    Van Bulck, Jo
    Piessens, Frank
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 651 - 670
  • [23] Mitigating EM Side-Channel Attacks with Dynamic Delay Insertion and Data Bus Inversion
    Jiang, Minmin
    Maragkoudaki, Eleni
    Pavlidis, Vasilis F.
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 1724 - 1728
  • [24] Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
    Javeed, Arsalan
    Yilmaz, Cemal
    Savas, Erkay
    IEEE ACCESS, 2023, 11 : 48945 - 48976
  • [25] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [26] Remote Side-Channel Attacks on Anonymous Transactions
    Tramer, Florian
    Boneh, Dan
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2739 - 2756
  • [27] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [28] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [29] Side-Channel Attacks on Shared Search Indexes
    Wang, Liang
    Grubbs, Paul
    Lu, Jiahui
    Bindschaedler, Vincent
    Cash, David
    Ristenpart, Thomas
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 673 - 692
  • [30] Side-Channel Expectation-Maximization Attacks
    Béguinot, Julien
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 774 - 799