Hardware-based Cyber Threats

被引:1
|
作者
Alves, Thiago [1 ]
Morris, Thomas [1 ]
机构
[1] Univ Alabama, Elect & Comp Engn, Huntsville, AL 35899 USA
关键词
Cyber-security; Embedded Systems; Computer Hardware Security;
D O I
10.5220/0006577202590266
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the last decade, cyber-security experts have been trying to mitigate attacks against computer networks and software. After the internet, the proliferation of thousands of virus, worms and trojans became easier, which then required enhancements for Operating Systems, browsers and anti-virus software in order to keep their users safe. However, what happens when the threat comes from the hardware? The Operating System trusts entirely in the hardware to perform its operations. If the hardware has been taken, it becomes much harder to regain control of the system. This paper describes eight different approaches to hardware attacks against software. It also demonstrates how to perform an attack using a USB device patched to behave like a generic HID Input Device, in order to insert malicious code in the system.
引用
收藏
页码:259 / 266
页数:8
相关论文
共 50 条
  • [1] Hardware-based cyber threats: attack vectors and defence techniques
    Montasari, Reza
    Hill, Richard
    Parkinson, Simon
    Daneshkhah, Alireza
    Hosseinian-Far, Amin
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2020, 12 (04) : 397 - 411
  • [2] Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
    Bienhaus, Diethelm
    Jaeger, Lukas
    Rieke, Roland
    Krauss, Christoph
    INTELLIGENT DISTRIBUTED COMPUTING XIII, 2020, 868 : 521 - 528
  • [3] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [4] Algorithms for hardware-based pattern recognition
    Lohweg, Volker
    Diederichs, Carsten
    Müller, Dietmar
    Eurasip Journal on Applied Signal Processing, 2004, 2004 (12): : 1912 - 1920
  • [5] Flexible Hardware-Based Stereo Matching
    Ambrosch, Kristian
    Kubinger, Wilfried
    Humenberger, Martin
    Steininger, Andreas
    EURASIP JOURNAL ON EMBEDDED SYSTEMS, 2008, (01)
  • [6] Hardware-based networking widens the pipes
    Ortiz, S
    COMPUTER, 1998, 31 (05) : 8 - 9
  • [7] Plugging hardware-based compression into a server
    不详
    EDN, 2007, 52 (24) : 30 - 30
  • [8] REFINEMENTS FOR HARDWARE-BASED LOGIC SIMULATION
    ROSE, C
    ELECTRONIC ENGINEERING, 1989, 61 (753): : 91 - &
  • [9] Research on hardware-based genetic algorithms
    Zhong, Guo-An
    Jin, Dong-Ming
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2000, 28 (11): : 72 - 76
  • [10] Hardware-based pointer data prefetcher
    Lai, SC
    Lu, SL
    21ST INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, PROCEEDINGS, 2003, : 290 - 298