Главная
Study mode:
on
1
Intro
2
Software security success forces attackers to lower layers
3
Dynamic Static Analysis
4
Challenge: construct an attack that is stealthy and small
5
Two threats, we focus on the stage that restricts the attacker the most
6
We leverage analog behavior to construct an attack that is stealthy and small
7
An ideal analog trigger
8
Challenge: small capacitors charge quickly, large capacitors induce current spikes
9
Solution: charge sharing
10
Creating an analog trigger using gated charge sharing
11
Creating a privilege escalation attack Our analog trigger is attack agnostic
12
Implanting A2 into an existing chip layout
Description:
Explore the intricacies of analog malicious hardware in this IEEE Symposium on Security & Privacy presentation. Delve into the challenges posed by fabrication-time attackers leveraging analog circuits to create small and stealthy hardware attacks. Learn how capacitors can be used to siphon charge from nearby wires, enabling remotely-controllable privilege escalation in chip designs. Examine the implementation of this attack in an OR1200 processor and understand its ability to evade activation by diverse benchmarks and known defenses. Gain insights into the vulnerabilities introduced by third-party chip fabrication and the limitations of post-fabrication testing in detecting such sophisticated attacks.

Analog Malicious Hardware

IEEE
Add to list
0:00 / 0:00