Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems

Shijia Wei, Aydin Aysu, M. Orshansky, A. Gerstlauer, Mohit Tiwari
{"title":"Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems","authors":"Shijia Wei, Aydin Aysu, M. Orshansky, A. Gerstlauer, Mohit Tiwari","doi":"10.1109/HST.2019.8740838","DOIUrl":null,"url":null,"abstract":"High-assurance embedded systems are deployed for decades and expensive to re-certify – hence, each new attack is an unpatchable problem that can only be detected by monitoring out-of-band channels such as the system’s power trace or electromagnetic emissions. Micro-Architectural attacks, for example, have recently come to prominence since they break all existing software-isolation based security – for example, by hammering memory rows to gain root privileges or by abusing speculative execution and shared hardware to leak secret data. This work is the first to use anomalies in an embedded system’s power trace to detect evasive micro-architectural attacks. To this end, we introduce power-mimicking micro-architectural attacks – including DRAM-rowhammer attacks, side/covert-channel and speculation-driven attacks – to study their evasiveness. We then quantify the operating range of the power-anomalies detector using the Odroid XU3 board – showing that rowhammer attacks cannot evade detection while covert channel and speculation-driven attacks can evade detection but are forced to operate at a 36× and 7× lower bandwidth. Our power-anomaly detector is efficient and can be embedded-of-band into (e.g.,) programmable batteries. While rowhammer, side-channel, and speculation-driven attack defenses require invasive code- and hardware-changes in general-purpose systems, we show that power-anomalies are a simple and effective defense for embedded systems. Power-anomalies can help future-proof embedded systems against vulnerabilities that are likely to emerge as new hardware like phase-change memories and accelerators become mainstream.","PeriodicalId":146928,"journal":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2019.8740838","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16

Abstract

High-assurance embedded systems are deployed for decades and expensive to re-certify – hence, each new attack is an unpatchable problem that can only be detected by monitoring out-of-band channels such as the system’s power trace or electromagnetic emissions. Micro-Architectural attacks, for example, have recently come to prominence since they break all existing software-isolation based security – for example, by hammering memory rows to gain root privileges or by abusing speculative execution and shared hardware to leak secret data. This work is the first to use anomalies in an embedded system’s power trace to detect evasive micro-architectural attacks. To this end, we introduce power-mimicking micro-architectural attacks – including DRAM-rowhammer attacks, side/covert-channel and speculation-driven attacks – to study their evasiveness. We then quantify the operating range of the power-anomalies detector using the Odroid XU3 board – showing that rowhammer attacks cannot evade detection while covert channel and speculation-driven attacks can evade detection but are forced to operate at a 36× and 7× lower bandwidth. Our power-anomaly detector is efficient and can be embedded-of-band into (e.g.,) programmable batteries. While rowhammer, side-channel, and speculation-driven attack defenses require invasive code- and hardware-changes in general-purpose systems, we show that power-anomalies are a simple and effective defense for embedded systems. Power-anomalies can help future-proof embedded systems against vulnerabilities that are likely to emerge as new hardware like phase-change memories and accelerators become mainstream.
利用功率异常对抗嵌入式系统中的规避性微架构攻击
高可靠性嵌入式系统已经部署了几十年,重新认证的成本很高,因此,每一次新的攻击都是一个无法修补的问题,只能通过监测带外通道(如系统的功率跟踪或电磁发射)来检测。例如,微架构攻击最近变得突出起来,因为它们破坏了所有现有的基于软件隔离的安全性——例如,通过敲打内存行来获得根权限,或者通过滥用推测执行和共享硬件来泄露机密数据。这项工作是第一次使用嵌入式系统电源跟踪中的异常来检测规避微架构攻击。为此,我们引入了模拟功率的微架构攻击——包括DRAM-rowhammer攻击、侧/隐蔽通道攻击和投机驱动攻击——来研究它们的规避性。然后,我们使用Odroid XU3板量化了功率异常检测器的工作范围-显示了钻锤攻击无法逃避检测,而隐蔽通道和投机驱动的攻击可以逃避检测,但被迫在36倍和7倍的低带宽下工作。我们的功率异常检测器是高效的,并且可以嵌入到(例如)可编程电池中。虽然rowhammer、侧信道和投机驱动的攻击防御需要在通用系统中更改侵入性代码和硬件,但我们表明电源异常是嵌入式系统的简单有效防御。电源异常可以帮助嵌入式系统抵御未来的漏洞,这些漏洞可能会随着相变存储器和加速器等新硬件成为主流而出现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信