Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities

被引:3
|
作者
Polychronou, Nikolaos Foivos [1 ]
Thevenon, Pierre-Henri [1 ]
Puys, Maxime [1 ]
Beroulle, Vincent [2 ]
机构
[1] Univ Grenoble Alpes, DSYS, LETI, CEA, Grenoble, France
[2] Univ Grenoble Alpes, LCIS, Grenoble INP, Valence, France
关键词
Security; Hardware performance counters; Attacks; Malware; Microarchitecture; Detection;
D O I
10.1109/NEWCAS50681.2021.9462776
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The microarchitecture of modern systems become more and more complicated. This increasing complexity gives rise to a new class of attacks which uses software code and targets hardware vulnerabilities of the system microarchitectures. Software attacks targeting hardware vulnerabilities (SATHVs) gain popularity. In particular, cache side channel attacks, Spectre, and Rowhammer are serious threats. They take advantage of microarchitectural vulnerabilities to extract secret information or harm the system. As these attacks target the system's hardware, they can avoid traditional software antivirus protections. However, they modify the normal operation of the system's hardware. Hardware Performance Counters (HPCs) are special registers that allow counting specific hardware events. These registers can help us monitor system's execution at hardware level and detect this set of attacks. Many solutions in the literature use HPCs to detect SATHVs. Although, these solutions target detecting only a limited set of the available SATHVs. If security designers do not consider all the possibilities, attackers can bypass existing protections using SATHV variants. In this article, we investigate how the side effect selection proposed in the literature, could or could not help us detect the studied attacks in our testing platform. Our threat model includes Cache side channel and Rowhammer attacks. We also discuss the limitations of software monitoring and how hardware approaches can resolve them.
引用
下载
收藏
页数:4
相关论文
共 50 条
  • [1] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms
    Polychronou, Nikolaos-Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2022, 27 (01)
  • [2] A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms
    Polychronou, Nikolaos-Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    ACM Transactions on Design Automation of Electronic Systems, 2021, 27 (01):
  • [3] MaDMAN: Detection of Software Attacks Targeting Hardware Vulnerabilities
    Polychronou, Nikolaos Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 355 - 362
  • [4] Securing Hardware from Malicious Attacks
    Abdelgawad, Mohamed M.A.
    Azer, Marianne A.
    TechRxiv, 2022,
  • [5] Securing IoT systems in a post-quantum environment: Vulnerabilities, attacks, and possible solutions
    Alomari, Ahmad
    Kumar, Sathish A. P.
    INTERNET OF THINGS, 2024, 25
  • [6] A Software Solution for Hardware Vulnerabilities
    Dharsee, Komail
    Johnson, Ethan
    Criswell, John
    2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 27 - 33
  • [7] Software and Hardware Security of IoT
    Singh, Ashwini Kumar
    Kushwaha, Nagendra
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 436 - 440
  • [8] A survey on Classification of Cyber-attacks on IoT and IIoT devices
    Shah, Yash
    Sengupta, Shamik
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 406 - 413
  • [9] Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions
    Karimi, Naghmeh
    Basu, Kanad
    Chang, Chip-Hong
    Fung, Jason M.
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 223 - 227
  • [10] Private circuits: Securing hardware against probing attacks
    Ishai, Y
    Sahai, A
    Wagner, D
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 463 - 481