Towards Dynamic Execution Environment for System Security Protection against Hardware Flaws

被引:0
|
作者
Schmitz, Kenneth [2 ]
Keszocze, Oliver [1 ,2 ]
Schmidt, Jurij [1 ,2 ]
Grosse, Daniel [1 ,2 ]
Drechsler, Rolf [1 ,2 ]
机构
[1] Univ Bremen, Inst Comp Sci, D-28359 Bremen, Germany
[2] DFKI GmbH, Cyber Phys Syst, D-28359 Bremen, Germany
关键词
D O I
10.1109/ISVLSI.2018.00107
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks exploiting security flaws in software are very common. They are typically addressed during the ongoing software development process or by providing software patches. Attacks making use of hardware related flaws via malicious software recently gained popularity. Prominent examples are errata based, aging-related or, for example, the infamous Rowhammer-attack. In this paper, we present an approach to detect software based attacks which exploit hardware flaws. Since the flaws are typically triggered by characteristic instruction sequences, our approach is implemented as a dynamic execution environment for program monitoring at runtime. Several case studies underline the effectiveness and the low overhead of our approach.
引用
收藏
页码:557 / 562
页数:6
相关论文
共 50 条
  • [21] iFlask: Isolate flask security system from dangerous execution environment by using ARM TrustZone
    Zhang, Diming
    You, Shaodi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 531 - 537
  • [22] A Dynamic Security Level Monitoring Approach for System Integrity Protection Scheme
    Chou, Yi-Ting
    Wang, Yi-Jen
    Liu, Chih-Wen
    Chen, Guan-Lin
    Chang, Chia-Chi
    2013 IEEE TENCON SPRING CONFERENCE, 2013, : 146 - 150
  • [24] Construction of Big Data Information Security Protection System in Industrial Internet Environment
    Na, Rongcui
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [25] Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device
    Gul, M. Junaid
    Riaz, Rabia
    Jararweh, Yaser
    Rathore, M. Mazhar
    Paul, Anand
    2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2019, : 154 - 159
  • [26] Towards Zero-Trust Hardware Architectures in Safety and Security Critical System-on-Chips
    Restuccia, Francesco
    Kastner, Ryan
    2024 IEEE 3RD REAL-TIME AND INTELLIGENT EDGE COMPUTING WORKSHOP, RAGE 2024, 2024, : 33 - 36
  • [27] Security protection and checking in embedded system integration against buffer overflow attacks
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 409 - 413
  • [28] Towards implementing scalable and reconfigurable SCADA security testbed in power system environment
    Qassim, Qais Saif
    Jamil, Norziana
    Daud, Maslina
    Hasan, Hafizah Che
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2019, 15 (02) : 91 - 120
  • [29] New Generation Power System Security Protection Technology Based on Dynamic Defense
    Chen, Xiaowei
    Jiang, Hefang
    Wu, Shaocheng
    Liu, Tao
    An, Tong
    Xu, Zhongwei
    Zhang, Man
    Shafiq, Muhammad
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 710 - 721
  • [30] A Framework For Special Protection System Modeling For Dynamic Security Assessment of Power Systems
    Wang, Lei
    Howell, Fred
    Morison, Kip
    2008 JOINT INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON) AND IEEE POWER INDIA CONFERENCE, VOLS 1 AND 2, 2008, : 588 - 593