Co-Processor Aided Attack on Embedded Multi-OS Environments

Pierre Schnarz, J. Wietzke, I. Stengel
{"title":"Co-Processor Aided Attack on Embedded Multi-OS Environments","authors":"Pierre Schnarz, J. Wietzke, I. Stengel","doi":"10.1109/ICITCS.2013.6717818","DOIUrl":null,"url":null,"abstract":"Within several domains of embedded computing, multi operating systems will be introduced in future. This is motivated by the need of fulfilling widespread requirements. Additionally, safety critical automotive domains add high demands on the security of such systems. Depending on the hardware architecture, it is possible to use several techniques to isolate systems. These are necessary for security reasons. Despite the state-of-the-art virtualization mechanisms, the idea of asymmetric-multiprocessing can be used to split a system's hardware resources, which makes the virtualization of hardware obsolete. However, independent devices like co-processors might add potential security risks. In this paper an attack vector is shown, which utilizes a co-processor to break through the isolation of an operating system domain. Using a multi operating system environment, we manipulate a co-processor in order to circumvent isolation mechanisms on behalf of an attacking operating system. The attack demonstrates an architectural demand to extend the virtualization capabilities of autarkic devices like co- processors.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on IT Convergence and Security (ICITCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2013.6717818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Within several domains of embedded computing, multi operating systems will be introduced in future. This is motivated by the need of fulfilling widespread requirements. Additionally, safety critical automotive domains add high demands on the security of such systems. Depending on the hardware architecture, it is possible to use several techniques to isolate systems. These are necessary for security reasons. Despite the state-of-the-art virtualization mechanisms, the idea of asymmetric-multiprocessing can be used to split a system's hardware resources, which makes the virtualization of hardware obsolete. However, independent devices like co-processors might add potential security risks. In this paper an attack vector is shown, which utilizes a co-processor to break through the isolation of an operating system domain. Using a multi operating system environment, we manipulate a co-processor in order to circumvent isolation mechanisms on behalf of an attacking operating system. The attack demonstrates an architectural demand to extend the virtualization capabilities of autarkic devices like co- processors.
嵌入式多操作系统环境的协处理器辅助攻击
在嵌入式计算的一些领域中,未来将引入多操作系统。这是出于满足广泛需求的需要。此外,安全关键的汽车领域对此类系统的安全性提出了很高的要求。根据硬件体系结构的不同,可以使用几种技术来隔离系统。出于安全考虑,这是必要的。尽管有最先进的虚拟化机制,但不对称多处理的思想可以用于分割系统的硬件资源,这使得硬件虚拟化过时了。然而,像协处理器这样的独立设备可能会增加潜在的安全风险。本文给出了一种利用协处理器突破操作系统域隔离的攻击向量。使用多操作系统环境,我们操纵协处理器以代表攻击操作系统规避隔离机制。这次攻击表明了一种架构需求,即扩展协同处理器等自给设备的虚拟化能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信