Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities

被引:3
|
作者
Polychronou, Nikolaos Foivos [1 ]
Thevenon, Pierre-Henri [1 ]
Puys, Maxime [1 ]
Beroulle, Vincent [2 ]
机构
[1] Univ Grenoble Alpes, DSYS, LETI, CEA, Grenoble, France
[2] Univ Grenoble Alpes, LCIS, Grenoble INP, Valence, France
关键词
Security; Hardware performance counters; Attacks; Malware; Microarchitecture; Detection;
D O I
10.1109/NEWCAS50681.2021.9462776
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The microarchitecture of modern systems become more and more complicated. This increasing complexity gives rise to a new class of attacks which uses software code and targets hardware vulnerabilities of the system microarchitectures. Software attacks targeting hardware vulnerabilities (SATHVs) gain popularity. In particular, cache side channel attacks, Spectre, and Rowhammer are serious threats. They take advantage of microarchitectural vulnerabilities to extract secret information or harm the system. As these attacks target the system's hardware, they can avoid traditional software antivirus protections. However, they modify the normal operation of the system's hardware. Hardware Performance Counters (HPCs) are special registers that allow counting specific hardware events. These registers can help us monitor system's execution at hardware level and detect this set of attacks. Many solutions in the literature use HPCs to detect SATHVs. Although, these solutions target detecting only a limited set of the available SATHVs. If security designers do not consider all the possibilities, attackers can bypass existing protections using SATHV variants. In this article, we investigate how the side effect selection proposed in the literature, could or could not help us detect the studied attacks in our testing platform. Our threat model includes Cache side channel and Rowhammer attacks. We also discuss the limitations of software monitoring and how hardware approaches can resolve them.
引用
下载
收藏
页数:4
相关论文
共 50 条
  • [41] Ontology-Driven Framework for Trend Analysis of Vulnerabilities and Impacts in IoT Hardware
    Bandi, Charan
    Salehi, Soheil
    Hassan, Rakibul
    Manoj, Sai P. D.
    Homayoun, Houman
    Rafatirad, Setareh
    2021 IEEE 15TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2021), 2021, : 211 - 214
  • [42] Securing Microservices Against Password Guess Attacks using Hardware Performance Counters
    Kadiyala, Sai Praveen
    Li, Xiaolan
    Lee, Wonjun
    Catlin, Andrew
    2022 IEEE 35TH INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (IEEE SOCC 2022), 2022, : 178 - 183
  • [43] Hardware and Software Framework for Controlling and Monitoring IoT Appliances
    Wane, Ibrahima
    Shin, Minjeong
    Kim, Sungun
    Lee, Suk Jin
    2019 ELEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2019), 2019, : 194 - 199
  • [44] Securing the IoT Gateway based on the Hardware Implementation of a Multi Pattern Search Algorithm
    Stanciu, Alexandra
    Balan, Titus-Constantin
    Gerigan, Carmen
    Zamfir, Sorin
    2017 INTERNATIONAL CONFERENCE ON OPTIMIZATION OF ELECTRICAL AND ELECTRONIC EQUIPMENT (OPTIM) & 2017 INTL AEGEAN CONFERENCE ON ELECTRICAL MACHINES AND POWER ELECTRONICS (ACEMP), 2017, : 1001 - 1006
  • [45] Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
    Baird, Iain
    Ghaleb, Baraq
    Wadhaj, Isam
    Russell, Gordon
    Buchanan, William J.
    ELECTRONICS, 2024, 13 (17)
  • [46] Securing Car2X Applications with effective Hardware Software
    Schweppe, Hendrik
    Idrees, M. -Sabir
    Roudier, Yves
    Gendrullis, Timo
    Wolf, Marko
    Weyl, Benjamin
    AUTOMOTIVE SECURITY, 2011, 2011, 2131 : 45 - 57
  • [47] Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses
    Biernacki, Lauren
    Gallagher, Mark
    Xu, Zhixing
    Aga, Misiker Tadesse
    Harris, Austin
    Wei, Shijia
    Tiwari, Mohit
    Kasikci, Baris
    Malik, Sharad
    Austin, Todd
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (03)
  • [48] An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions
    Bang, Ankur O.
    Rao, Udai Pratap
    Visconti, Andrea
    Brighente, Alessandro
    Conti, Mauro
    COMPUTERS & SECURITY, 2022, 123
  • [49] Investigating Bluetooth Vulnerabilities to Defend from Attacks
    Patel, Nishitkumar
    Wimmer, Hayden
    Rebman, Carl M.
    ISMSIT 2021 - 5th International Symposium on Multidisciplinary Studies and Innovative Technologies, Proceedings, 2021, : 549 - 554
  • [50] Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks
    Fournaris, Apostolos P.
    Fraile, Lidia Pocero
    Koufopavlou, Odysseas
    ELECTRONICS, 2017, 6 (03)