Utilize este identificador para referenciar este registo:
https://hdl.handle.net/1822/87668
Registo completo
Campo DC | Valor | Idioma |
---|---|---|
dc.contributor.author | Rodrigues, Cristiano | por |
dc.contributor.author | Oliveira, Daniel | por |
dc.contributor.author | Pinto, Sandro | por |
dc.date.accessioned | 2023-12-27T11:36:09Z | - |
dc.date.available | 2023-12-27T11:36:09Z | - |
dc.date.issued | 2023 | - |
dc.identifier.isbn | 979-8-3503-3130-1 | - |
dc.identifier.issn | 2375-1207 | - |
dc.identifier.uri | https://hdl.handle.net/1822/87668 | - |
dc.description.abstract | Spectre and Meltdown have pushed the research community toward an otherwise-unavailable understanding of the security implications of processors’ microarchitecture. Notwithstanding, research efforts have concentrated on highend processors (e.g., Intel, AMD, Arm Cortex-A), and very little has been done for microcontrollers (MCU) that power billions of small embedded and IoT devices. In this paper, we present BUSted. BUSted is a novel side-channel attack that explores the side effects of the MCU bus interconnect arbitration logic to bypass security guarantees enforced by memory protection primitives. Side-channel attacks on MCUs pose incremental and unforeseen challenges, which are strictly tied to the resource-constrained nature of these systems (e.g., single-core CPU, stateless bus). We devise a unique approach that relies on the concept of hardware gadgets. We present practical attacks on state-of-the-art Armv8-M MCUs with TrustZone-M, running the Trusted Firmware-M (TF-M). In contrast to the Nemesis attack, our attack is practical on Arm Cortex-M MCUs, and our findings suggest that it can scale across the full MCU spectrum. | por |
dc.description.sponsorship | We would like to thank the reviewers for their valuable feedback and suggestions. Cristiano Rodrigues was supported by FCT grant 2020.08729.BD. Daniel Oliveira was supported by FCT grant 2020.04585.BD. This work is supported by FCT – Fundac¸ao para a Cência e Tecnologia within the R&D Units Project Scope UIDB/00319/2020, and partially by the European Union’s Horizon Europe research and innovation program under grant agreement No 101070537, project CROSSCON (Cross-platform Open Security Stack for Connected Devices). | por |
dc.language.iso | por | por |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | por |
dc.relation | info:eu-repo/grantAgreement/FCT/POR_NORTE/2020.08729.BD/PT | por |
dc.relation | info:eu-repo/grantAgreement/FCT/POR_NORTE/2020.04585.BD/PT | por |
dc.relation | info:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UIDB%2F00319%2F2020/PT | por |
dc.rights | openAccess | por |
dc.subject | Side-channels | por |
dc.subject | Microarchitecture | por |
dc.subject | Bus | por |
dc.subject | Micro controllers | por |
dc.subject | TEE | por |
dc.subject | TrustZone-M | por |
dc.title | BUSted!!! Microarchitectural side-channel attacks on the MCU bus interconnect | por |
dc.type | conferencePaper | por |
dc.peerreviewed | yes | por |
dc.relation.publisherversion | https://www.computer.org/csdl/proceedings-article/sp/2024/313000a062/1RjEazNfZ5u | por |
dc.identifier.doi | 10.1109/SP54263.2024.00062 | por |
sdum.journal | Proceedings - IEEE Symposium on Security and Privacy | por |
sdum.conferencePublication | IEEE Symposium on Security and Privacy (SP) | por |
Aparece nas coleções: |
Ficheiros deste registo:
Ficheiro | Descrição | Tamanho | Formato | |
---|---|---|---|---|
BUSted-final.pdf | 1,67 MB | Adobe PDF | Ver/Abrir |