Hardware-based Cyber Threats

被引:1
|
作者
Alves, Thiago [1 ]
Morris, Thomas [1 ]
机构
[1] Univ Alabama, Elect & Comp Engn, Huntsville, AL 35899 USA
关键词
Cyber-security; Embedded Systems; Computer Hardware Security;
D O I
10.5220/0006577202590266
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the last decade, cyber-security experts have been trying to mitigate attacks against computer networks and software. After the internet, the proliferation of thousands of virus, worms and trojans became easier, which then required enhancements for Operating Systems, browsers and anti-virus software in order to keep their users safe. However, what happens when the threat comes from the hardware? The Operating System trusts entirely in the hardware to perform its operations. If the hardware has been taken, it becomes much harder to regain control of the system. This paper describes eight different approaches to hardware attacks against software. It also demonstrates how to perform an attack using a USB device patched to behave like a generic HID Input Device, in order to insert malicious code in the system.
引用
收藏
页码:259 / 266
页数:8
相关论文
共 50 条
  • [21] Teaching hardware-based DSP: Theory to practice
    Wright, CHG
    Welch, TB
    Etter, DM
    Morrow, MG
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 4148 - 4151
  • [22] Hardware-based volumetric knit-wear
    Daubert, K
    Seidel, HP
    COMPUTER GRAPHICS FORUM, 2002, 21 (03) : 575 - +
  • [23] OPERATIONAL CHARACTERISTICS OF A HARDWARE-BASED PATTERN MATCHER
    HASKIN, RL
    HOLLAAR, LA
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1983, 8 (01): : 15 - 40
  • [24] ARMlock: Hardware-based Fault Isolation for ARM
    Zhou, Yajin
    Wang, Xiaoguang
    Chen, Yue
    Wang, Zhi
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 558 - 569
  • [25] Energy characterization of hardware-based data prefetching
    Guo, Y
    Chheda, S
    Koren, I
    Krishna, CM
    Moritz, CA
    IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN: VLSI IN COMPUTERS & PROCESSORS, PROCEEDINGS, 2004, : 518 - 523
  • [26] Privacy Enhancements for Hardware-Based Security Modules
    Pasupathinathan, Vijayakrishnan
    Pieprzyk, Josef
    Wang, Huaxiong
    E-BUSINESS AND TELECOMMUNICATIONS, 2011, 130 : 224 - +
  • [27] A simplified scheme for hardware-based pattern recognition
    Henke, T
    Ginzel, T
    Lohweg, V
    2005 International Conference on Image Processing (ICIP), Vols 1-5, 2005, : 301 - 304
  • [28] A hardware-based predictive motion estimation algorithm
    Hamalainen, S
    Koskinen, L
    Halonen, K
    2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 6114 - 6117
  • [29] Hardware-Based Fast Hybrid Morphological Reconstruction
    Anacona-Mosquera, Oscar
    dos Santos, Carlos Eduardo
    Cabral, Felipe R. G.
    Sampaio, Renato C.
    Teodoro, George
    Jacobi, Ricardo Pezzuol
    Llanos, Carlos Humberto
    IEEE DESIGN & TEST, 2020, 37 (03) : 30 - 39
  • [30] A Survey on Hardware-Based Malware Detection Approaches
    Chenet, Cristiano Pegoraro
    Savino, Alessandro
    Di Carlo, Stefano
    IEEE ACCESS, 2024, 12 : 54115 - 54128