Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities

被引:3
|
作者
Polychronou, Nikolaos Foivos [1 ]
Thevenon, Pierre-Henri [1 ]
Puys, Maxime [1 ]
Beroulle, Vincent [2 ]
机构
[1] Univ Grenoble Alpes, DSYS, LETI, CEA, Grenoble, France
[2] Univ Grenoble Alpes, LCIS, Grenoble INP, Valence, France
关键词
Security; Hardware performance counters; Attacks; Malware; Microarchitecture; Detection;
D O I
10.1109/NEWCAS50681.2021.9462776
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The microarchitecture of modern systems become more and more complicated. This increasing complexity gives rise to a new class of attacks which uses software code and targets hardware vulnerabilities of the system microarchitectures. Software attacks targeting hardware vulnerabilities (SATHVs) gain popularity. In particular, cache side channel attacks, Spectre, and Rowhammer are serious threats. They take advantage of microarchitectural vulnerabilities to extract secret information or harm the system. As these attacks target the system's hardware, they can avoid traditional software antivirus protections. However, they modify the normal operation of the system's hardware. Hardware Performance Counters (HPCs) are special registers that allow counting specific hardware events. These registers can help us monitor system's execution at hardware level and detect this set of attacks. Many solutions in the literature use HPCs to detect SATHVs. Although, these solutions target detecting only a limited set of the available SATHVs. If security designers do not consider all the possibilities, attackers can bypass existing protections using SATHV variants. In this article, we investigate how the side effect selection proposed in the literature, could or could not help us detect the studied attacks in our testing platform. Our threat model includes Cache side channel and Rowhammer attacks. We also discuss the limitations of software monitoring and how hardware approaches can resolve them.
引用
下载
收藏
页数:4
相关论文
共 50 条
  • [31] Assessing Vulnerabilities and IoT-Enabled Attacks on Smart Lighting Systems
    Stellios, Ioannis
    Mokos, Kostas
    Kotzanikolaou, Panayiotis
    COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS, 2022, 13106 : 199 - 217
  • [32] Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures
    Siwakoti, Yuba Raj
    Bhurtel, Manish
    Rawat, Danda B. B.
    Oest, Adam
    Johnson, R. C.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (13) : 11224 - 11239
  • [33] A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks
    Yu, Weize
    Kose, Selcuk
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2017, 64 (11) : 2934 - 2944
  • [34] Performance of Fully Software and Hardware Accelerated XML Processing and Securing
    Knap, Tomas
    Mlynkova, Irena
    Necasky, Martin
    IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 604 - 608
  • [35] On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids
    Mathas, Christos-Minas
    Vassilakis, Costas
    Kolokotronis, Nicholas
    Zarakovitis, Charilaos C.
    Kourtis, Michail-Alexandros
    ENERGIES, 2021, 14 (10)
  • [36] PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices
    Maroof, Uzma
    Shaghaghi, Arash
    Jha, Sanjay
    PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19), 2019, : 50 - 56
  • [37] Enhancing Security against Software Attacks with Reprogrammable Hardware
    Andel, Todd R.
    Whitehurst, Lindsey N.
    McDonald, J. Todd
    Al-Assadi, Waleed
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 258 - 266
  • [38] OS-level Software & Hardware Attacks and Defenses
    Gens, David
    PHD FORUM '18: PROCEEDINGS OF THE 2018 WORKSHOP ON MOBISYS 2018 PH.D. FORUM, 2018, : 7 - 8
  • [39] SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
    Grycel, Jacob
    Schaumont, Patrick
    CRYPTOGRAPHY, 2021, 5 (02)
  • [40] Securing IoT Devices Running PureOS from Ransomware Attacks: Leveraging Hybrid Machine Learning Techniques
    Ahanger, Tariq Ahamed
    Tariq, Usman
    Dahan, Fadl
    Chaudhry, Shafique A.
    Malik, Yasir
    MATHEMATICS, 2023, 11 (11)