BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect

被引:1
|
作者
Rodrigues, Cristiano [1 ]
Oliveira, Daniel [1 ]
Pinto, Sandro [1 ]
机构
[1] Univ Minho, Ctr ALGORITMI LASI, Braga, Portugal
关键词
Side-Channels; Microarchitecture; Bus; Microcontrollers; TEE; TrustZone-M;
D O I
10.1109/SP54263.2024.00062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spectre and Meltdown have pushed the research community toward an otherwise-unavailable understanding of the security implications of processors' microarchitecture. Notwithstanding, research efforts have concentrated on highend processors (e.g., Intel, AMD, Arm Cortex-A), and very little has been done for microcontrollers (MCU) that power billions of small embedded and IoT devices. In this paper, we present BUSted. BUSted is a novel side-channel attack that explores the side effects of the MCU bus interconnect arbitration logic to bypass security guarantees enforced by memory protection primitives. Side-channel attacks on MCUs pose incremental and unforeseen challenges, which are strictly tied to the resource-constrained nature of these systems (e.g., single-core CPU, stateless bus). We devise a unique approach that relies on the concept of hardware gadgets. We present practical attacks on state-of-the-art Armv8-M MCUs with TrustZone-M, running the Trusted Firmware-M (TF-M). In contrast to the Nemesis attack, our attack is practical on Arm Cortex-M MCUs, and our findings suggest that it can scale across the full MCU spectrum.
引用
收藏
页码:3679 / 3696
页数:18
相关论文
共 50 条
  • [41] Side-Channel Attacks on Fingerprint Matching Algorithms
    Duermuth, Markus
    Oswald, David
    Pastewka, Niklas
    TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 3 - 13
  • [42] Beyond the CPU: Side-Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE DESIGN & TEST, 2021, 38 (03) : 15 - 21
  • [43] On the Challenges of Detecting Side-Channel Attacks in SGX
    Jiang, Jianyu
    Soriente, Claudio
    Karame, Ghassan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 86 - 98
  • [44] SonarSnoop: active acoustic side-channel attacks
    Peng Cheng
    Ibrahim Ethem Bagci
    Utz Roedig
    Jeff Yan
    International Journal of Information Security, 2020, 19 : 213 - 228
  • [45] Acoustic Side-Channel Attacks on a Computer Mouse
    Conti, Mauro
    Duroyon, Marin
    Orazi, Gabriele
    Tsudik, Gene
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2024, 2024, 14828 : 44 - 63
  • [46] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [47] Remote Side-Channel Attacks on Heterogeneous SoC
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    Olivier, Francis
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 109 - 125
  • [48] Side-Channel Attacks on Optane Persistent Memory
    Liu, Sihang
    Kanniwadi, Suraaj
    Schwarzl, Martin
    Kogler, Andreas
    Gruss, Daniel
    Khan, Samira
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6807 - 6824
  • [49] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557
  • [50] Side-Channel Attacks Detection Methods: A Survey
    Assaeedi, Joanna
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 288 - 296