Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities

被引:3
|
作者
Polychronou, Nikolaos Foivos [1 ]
Thevenon, Pierre-Henri [1 ]
Puys, Maxime [1 ]
Beroulle, Vincent [2 ]
机构
[1] Univ Grenoble Alpes, DSYS, LETI, CEA, Grenoble, France
[2] Univ Grenoble Alpes, LCIS, Grenoble INP, Valence, France
关键词
Security; Hardware performance counters; Attacks; Malware; Microarchitecture; Detection;
D O I
10.1109/NEWCAS50681.2021.9462776
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The microarchitecture of modern systems become more and more complicated. This increasing complexity gives rise to a new class of attacks which uses software code and targets hardware vulnerabilities of the system microarchitectures. Software attacks targeting hardware vulnerabilities (SATHVs) gain popularity. In particular, cache side channel attacks, Spectre, and Rowhammer are serious threats. They take advantage of microarchitectural vulnerabilities to extract secret information or harm the system. As these attacks target the system's hardware, they can avoid traditional software antivirus protections. However, they modify the normal operation of the system's hardware. Hardware Performance Counters (HPCs) are special registers that allow counting specific hardware events. These registers can help us monitor system's execution at hardware level and detect this set of attacks. Many solutions in the literature use HPCs to detect SATHVs. Although, these solutions target detecting only a limited set of the available SATHVs. If security designers do not consider all the possibilities, attackers can bypass existing protections using SATHV variants. In this article, we investigate how the side effect selection proposed in the literature, could or could not help us detect the studied attacks in our testing platform. Our threat model includes Cache side channel and Rowhammer attacks. We also discuss the limitations of software monitoring and how hardware approaches can resolve them.
引用
下载
收藏
页数:4
相关论文
共 50 条
  • [21] Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance
    An, Zhenliang
    Wang, Weike
    Li, Wenxin
    Li, Senyang
    Zhang, Dexue
    MICROMACHINES, 2023, 14 (08)
  • [22] Securing IIoT systems against DDoS attacks with adaptive moving target defense strategies
    Sangita Swati
    Jawar Roy
    Jimson Singh
    undefined Mathew
    Scientific Reports, 15 (1)
  • [23] Hardware Trojan Mitigation for Securing On-chip Networks from Dead Flit Attacks
    Khan, Mohammad Humam
    Gupta, Ruchika
    Kulkarni, Vedika J.
    Jose, John
    Nandi, Sukumar
    PROCEEDINGS OF THE 2022 IFIP/IEEE 30TH INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2022,
  • [24] Analyzing Security Approaches for Threats,Vulnerabilities, and attacks in an IoT Environment
    Tyagi, Himani
    Kumar, Rajendra
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 227 - 233
  • [25] Securing IoT Networks from DDoS Attacks Using a Temporary Dynamic IP Strategy
    El Fawal, Ahmad Hani
    Mansour, Ali
    Uddin, Mohammad Ammad
    Nasser, Abbass
    SENSORS, 2024, 24 (13)
  • [26] Vulnerabilities in IoT Devices with Software-Defined Radio
    Phan Duy Hung
    Bui Trong Vinh
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 664 - 668
  • [27] Machine Learning Methods to Detect Voltage Glitch Attacks on IoT/IIoT Infrastructures
    Jiang, Wei
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [28] Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters
    Li, Congmiao
    Gaudiot, Jean-Luc
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 588 - 597
  • [29] "Software Reconfigurable Hardware" in IoT Student Training
    Ursutiu, Doru
    Samoila, Cornel
    Neagu, Andrei
    Florea, Aurelia
    Chiricioiu, Adriana
    CHALLENGES OF THE DIGITAL TRANSFORMATION IN EDUCATION, ICL2018, VOL 1, 2020, 916 : 410 - 416
  • [30] Embedded IOT System: Software and Security Attacks
    Sabir, Muhammad Ayub
    Malik, Muhammad Sheraz Arshad
    Ashraf, Fatima
    Rasheed, Rubab
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (08): : 70 - 73