{"title":"Co-Processor Aided Attack on Embedded Multi-OS Environments","authors":"Pierre Schnarz, J. Wietzke, I. Stengel","doi":"10.1109/ICITCS.2013.6717818","DOIUrl":null,"url":null,"abstract":"Within several domains of embedded computing, multi operating systems will be introduced in future. This is motivated by the need of fulfilling widespread requirements. Additionally, safety critical automotive domains add high demands on the security of such systems. Depending on the hardware architecture, it is possible to use several techniques to isolate systems. These are necessary for security reasons. Despite the state-of-the-art virtualization mechanisms, the idea of asymmetric-multiprocessing can be used to split a system's hardware resources, which makes the virtualization of hardware obsolete. However, independent devices like co-processors might add potential security risks. In this paper an attack vector is shown, which utilizes a co-processor to break through the isolation of an operating system domain. Using a multi operating system environment, we manipulate a co-processor in order to circumvent isolation mechanisms on behalf of an attacking operating system. The attack demonstrates an architectural demand to extend the virtualization capabilities of autarkic devices like co- processors.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on IT Convergence and Security (ICITCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2013.6717818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Within several domains of embedded computing, multi operating systems will be introduced in future. This is motivated by the need of fulfilling widespread requirements. Additionally, safety critical automotive domains add high demands on the security of such systems. Depending on the hardware architecture, it is possible to use several techniques to isolate systems. These are necessary for security reasons. Despite the state-of-the-art virtualization mechanisms, the idea of asymmetric-multiprocessing can be used to split a system's hardware resources, which makes the virtualization of hardware obsolete. However, independent devices like co-processors might add potential security risks. In this paper an attack vector is shown, which utilizes a co-processor to break through the isolation of an operating system domain. Using a multi operating system environment, we manipulate a co-processor in order to circumvent isolation mechanisms on behalf of an attacking operating system. The attack demonstrates an architectural demand to extend the virtualization capabilities of autarkic devices like co- processors.