首页> 外文期刊>IEEE transactions on very large scale integration (VLSI) systems >HarTBleed: Using Hardware Trojans for Data Leakage Exploits
【24h】

HarTBleed: Using Hardware Trojans for Data Leakage Exploits

机译:Hartbleed:使用硬件特洛伊木马进行数据泄漏利用

获取原文
获取原文并翻译 | 示例

摘要

Data and information leakage is an important security concern in current systems. Several data leakage prevention (DLP) techniques have been proposed in the literature to prevent external as well as internal data leakage. Most of these solutions try to trace data flow and perform privilege checks to ensure the security of the data at the software and system level. Architecture level leakage vulnerabilities such as Spectre and Meltdown can be mitigated by performance-expensive software patches or by modifying the architecture itself. However, these solutions assume that the underlying hardware platform is secure and free from tampering. In this article, we present HarTBleed, a class of system attacks involving hardware compromised with a Trojan embedded in the CPU. We show that attacks crafted specifically to make use of the Trojan can be used to obtain sensitive information from the address space of a process. We propose the use of a capacitor-based Trojan trigger that exploits the virtual addressing of L1 cache to activate a Trojan payload that resets a target translation lookaside buffer (TLB) entry to maliciously map to sensitive data in memory. Extensive circuit simulation indicates that the proposed Trojan trigger is not activated during test or normal operation even under a wide range of process/temperature conditions. Therefore, it remains undetected. A successful HarTBleed-based exploit is demonstrated using an attack code by modeling the Trojan effects in the GEM5 simulator.
机译:数据和信息泄漏是当前系统中的重要安全问题。在文献中提出了几种数据泄漏预防(DLP)技术,以防止外部和内部数据泄漏。这些解决方案中的大多数都尝试跟踪数据流并执行权限检查以确保在软件和系统级别的数据的安全性。架构级别泄漏漏洞,如幽灵和熔化,可以通过性能昂贵的软件补丁来缓解,或通过修改架构本身来减轻。然而,这些解决方案假设底层硬件平台是安全的并且没有篡改。在本文中,我们突然存在,一类系统攻击涉及用嵌入在CPU中的特洛伊木马妥协的硬件。我们表明,专门用于利用木马制作的攻击可用于从进程的地址空间获取敏感信息。我们建议使用基于电容的特洛伊木马触发器,该触发器利用L1缓存的虚拟寻址,以激活重置目标转换Lookaside缓冲区(TLB)条目的特洛伊木马有效负载,以恶意地映射到内存中的敏感数据。广泛的电路仿真表明,即使在各种过程/温度条件下也不会在测试或正常操作期间激活所提出的特洛伊木马触发。因此,它仍然未被发现。通过在GEM5模拟器中建模特洛伊木马效果来使用攻击代码来演示成功的基于哈尔巴利的漏洞利用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号