Hardware-based Cyber Threats

被引:1
|
作者
Alves, Thiago [1 ]
Morris, Thomas [1 ]
机构
[1] Univ Alabama, Elect & Comp Engn, Huntsville, AL 35899 USA
关键词
Cyber-security; Embedded Systems; Computer Hardware Security;
D O I
10.5220/0006577202590266
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the last decade, cyber-security experts have been trying to mitigate attacks against computer networks and software. After the internet, the proliferation of thousands of virus, worms and trojans became easier, which then required enhancements for Operating Systems, browsers and anti-virus software in order to keep their users safe. However, what happens when the threat comes from the hardware? The Operating System trusts entirely in the hardware to perform its operations. If the hardware has been taken, it becomes much harder to regain control of the system. This paper describes eight different approaches to hardware attacks against software. It also demonstrates how to perform an attack using a USB device patched to behave like a generic HID Input Device, in order to insert malicious code in the system.
引用
收藏
页码:259 / 266
页数:8
相关论文
共 50 条
  • [41] Security Primitives for Reconfigurable Hardware-Based Systems
    Huffmire, Ted
    Levin, Timothy
    Thuy Nguyen
    Irvine, Cynthia
    Brotherton, Brett
    Wang, Gang
    Sherwood, Timothy
    Kastner, Ryan
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2010, 3 (02)
  • [42] Hardware-based Hash Functions for Network Applications
    Yamaguchi, Fumito
    Nishi, Hiroaki
    2013 19TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON), 2013,
  • [43] Development of Software and Hardware to Protect Technological Processes from Cyber Threats
    F. G. Pashaev
    D. I. Zeinalov
    G. T. Nadzhafov
    Automatic Control and Computer Sciences, 2024, 58 (8) : 1396 - 1405
  • [44] SpecCert: Specifying and Verifying Hardware-Based Security Enforcement
    Letan, Thomas
    Chifflier, Pierre
    Hiet, Guillaume
    Neron, Pierre
    Morin, Benjamin
    FM 2016: FORMAL METHODS, 2016, 9995 : 496 - 512
  • [45] Foundations of Hardware-Based Attested Computation and Application to SGX
    Barbosa, Manuel
    Portela, Bernardo
    Scerri, Guillaume
    Warinschi, Bogdan
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 245 - 260
  • [46] Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk)
    Sadeghi, Ahmad-Reza
    CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 199 - 200
  • [47] Application of hardware-based IT security measures in automation networks
    Runde, Markus
    Niemann, K. -H.
    Hausmann, Stefan
    Heiss, Stefan
    AUTOMATION 2012, 2012, 2171 : 391 - 394
  • [48] Performance improvement of hardware-based packet classification algorithm
    Chen, YC
    Wang, PC
    Lee, CL
    Chan, CT
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 728 - 736
  • [49] Hardware-based IT security - Security Token Technologies in Automation
    Runde, Markus
    Niemann, Karl-Heinz
    Tebbe, Christopher
    ATP EDITION, 2012, (03): : 42 - 49
  • [50] Efficient Hardware-Based Nonintrusive Dynamic Application Profiling
    Nair, Ajay
    Shankar, Karthik
    Lysecky, Roman
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2011, 10 (03)