Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/87668

Registo completo
Campo DCValorIdioma
dc.contributor.authorRodrigues, Cristianopor
dc.contributor.authorOliveira, Danielpor
dc.contributor.authorPinto, Sandropor
dc.date.accessioned2023-12-27T11:36:09Z-
dc.date.available2023-12-27T11:36:09Z-
dc.date.issued2023-
dc.identifier.isbn979-8-3503-3130-1-
dc.identifier.issn2375-1207-
dc.identifier.urihttps://hdl.handle.net/1822/87668-
dc.description.abstractSpectre and Meltdown have pushed the research community toward an otherwise-unavailable understanding of the security implications of processors’ microarchitecture. Notwithstanding, research efforts have concentrated on highend processors (e.g., Intel, AMD, Arm Cortex-A), and very little has been done for microcontrollers (MCU) that power billions of small embedded and IoT devices. In this paper, we present BUSted. BUSted is a novel side-channel attack that explores the side effects of the MCU bus interconnect arbitration logic to bypass security guarantees enforced by memory protection primitives. Side-channel attacks on MCUs pose incremental and unforeseen challenges, which are strictly tied to the resource-constrained nature of these systems (e.g., single-core CPU, stateless bus). We devise a unique approach that relies on the concept of hardware gadgets. We present practical attacks on state-of-the-art Armv8-M MCUs with TrustZone-M, running the Trusted Firmware-M (TF-M). In contrast to the Nemesis attack, our attack is practical on Arm Cortex-M MCUs, and our findings suggest that it can scale across the full MCU spectrum.por
dc.description.sponsorshipWe would like to thank the reviewers for their valuable feedback and suggestions. Cristiano Rodrigues was supported by FCT grant 2020.08729.BD. Daniel Oliveira was supported by FCT grant 2020.04585.BD. This work is supported by FCT – Fundac¸ao para a Cência e Tecnologia within the R&D Units Project Scope UIDB/00319/2020, and partially by the European Union’s Horizon Europe research and innovation program under grant agreement No 101070537, project CROSSCON (Cross-platform Open Security Stack for Connected Devices).por
dc.language.isoporpor
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)por
dc.relationinfo:eu-repo/grantAgreement/FCT/POR_NORTE/2020.08729.BD/PTpor
dc.relationinfo:eu-repo/grantAgreement/FCT/POR_NORTE/2020.04585.BD/PTpor
dc.relationinfo:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UIDB%2F00319%2F2020/PTpor
dc.rightsopenAccesspor
dc.subjectSide-channelspor
dc.subjectMicroarchitecturepor
dc.subjectBuspor
dc.subjectMicro controllerspor
dc.subjectTEEpor
dc.subjectTrustZone-Mpor
dc.titleBUSted!!! Microarchitectural side-channel attacks on the MCU bus interconnectpor
dc.typeconferencePaperpor
dc.peerreviewedyespor
dc.relation.publisherversionhttps://www.computer.org/csdl/proceedings-article/sp/2024/313000a062/1RjEazNfZ5upor
dc.identifier.doi10.1109/SP54263.2024.00062por
sdum.journalProceedings - IEEE Symposium on Security and Privacypor
sdum.conferencePublicationIEEE Symposium on Security and Privacy (SP)por
Aparece nas coleções:CAlg - Artigos em livros de atas/Papers in proceedings

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
BUSted-final.pdf1,67 MBAdobe PDFVer/Abrir

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID