首页> 外文会议>IEEE Symposium on Security and Privacy >Understanding the Security of ARM Debugging Features
【24h】

Understanding the Security of ARM Debugging Features

机译:了解ARM调试功能的安全性

获取原文

摘要

Processors nowadays are consistently equipped with debugging features to facilitate the program analysis. Specifically, the ARM debugging architecture involves a series of CoreSight components and debug registers to aid the system debugging, and a group of debug authentication signals are designed to restrict the usage of these components and registers. Meantime, the security of the debugging features is under-examined since it normally requires physical access to use these features in the traditional debugging model. However, ARM introduces a new debugging model that requires no physical access since ARMv7, which exacerbates our concern on the security of the debugging features. In this paper, we perform a comprehensive security analysis of the ARM debugging features, and summarize the security and vulnerability implications. To understand the impact of the implications, we also investigate a series of ARM-based platforms in different product domains (i.e., development boards, IoT devices, cloud servers, and mobile devices). We consider the analysis and investigation expose a new attacking surface that universally exists in ARM-based platforms. To verify our concern, we further craft Nailgun attack, which obtains sensitive information (e.g., AES encryption key and fingerprint image) and achieves arbitrary payload execution in a high-privilege mode from a low-privilege mode via misusing the debugging features. This attack does not rely on software bugs, and our experiments show that almost all the platforms we investigated are vulnerable to the attack. The potential mitigations are discussed from different perspectives in the ARM ecosystem.
机译:如今处理器一直配备调试功能,以方便程序分析。具体而言,ARM调试架构涉及一系列CORESIGHT组件和调试寄存器,以帮助系统调试,并且旨在限制这些组件和寄存器的使用。同时,遭到调试功能的安全性,因为它通常需要物理访问在传统调试模型中使用这些功能。但是,ARM介绍了一个新的调试模型,它从ARMv7以来不需要物理访问,这加剧了我们对调试功能的安全性的关注。在本文中,我们对ARM调试功能进行了全面的安全分析,并总结了安全性和漏洞影响。要了解含义的影响,我们还研究了不同产品域中的一系列基于ARM的平台(即,开发板,IOT设备,云服务器和移动设备)。我们考虑分析和调查暴露了一个普遍存在的基于ARM的平台上的新攻击表面。为了验证我们的担忧,我们进一步进一步绘制了奈吉攻击,该攻击攻击(例如,AES加密密钥和指纹图像),并通过误用调试功能从低权限模式实现高等权限模式中的任意有效载荷执行。此攻击不依赖于软件错误,我们的实验表明,几乎所有我们调查的平台都容易受到攻击的影响。从ARM生态系统中的不同观点讨论了潜在的缓解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号