Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation

被引:39
作者
Tsoutsos, Nektarios Georgios [1 ]
Maniatakos, Michail [2 ]
机构
[1] NYU, Dept Comp Sci & Engn, Polytech Sch Engn, Brooklyn, NY 11201 USA
[2] New York Univ Abu Dhabi, Dept Elect & Comp Engn, Abu Dhabi 6284313, U Arab Emirates
关键词
Hardware trojans; fabrication attacks; microprocessors; zero overhead; malicious modification; privilege escalation; HARDWARE; FAULTS;
D O I
10.1109/TETC.2013.2287186
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide deployment of general purpose and embedded microprocessors has emphasized the need for defenses against cyber-attacks. Due to the globalized supply chain, however, there are several stages where a processor can be maliciously modified. The most promising stage, and the hardest during which to inject the hardware trojan, is the fabrication stage. As modern microprocessor chips are characterized by very dense, billion-transistor designs, such attacks must be very carefully crafted. In this paper, we demonstrate zero overhead malicious modifications on both high-performance and embedded microprocessors. These hardware trojans enable privilege escalation through execution of an instruction stream that excites the necessary conditions to make the modification appear. The minimal footprint, however, comes at the cost of a small window of attack opportunities. Experimental results show that malicious users can gain escalated privileges within a few million clock cycles. In addition, no system crashes were reported during normal operation, rendering the modifications transparent to the end user.
引用
收藏
页码:81 / 93
页数:13
相关论文
共 38 条
[1]  
Aas J., 2005, Understanding the Linux 2.6.8.1 CPU Scheduler
[2]  
Advanced Micro Devices, 1999, 33047 AMD CORP
[3]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[4]   Designer's hardware Trojan horse [J].
Alkabani, Yousra ;
Koushanfar, Farinaz .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :82-83
[5]  
Binkert Nathan, 2011, Computer Architecture News, V39, P1, DOI 10.1145/2024716.2024718
[6]  
Charette R. N., THIS CAR RUNS CODE
[7]  
Chess B., 1994, Proceedings 12th IEEE VLSI Test Symposium (Cat. No.94TH0645-2), P446, DOI 10.1109/VTEST.1994.292275
[8]   Logic testing of bridging faults in CMOS integrated circuits [J].
Chess, B ;
Larrabee, T .
IEEE TRANSACTIONS ON COMPUTERS, 1998, 47 (03) :338-345
[9]  
Davi L, 2011, LECT NOTES COMPUT SC, V6531, P346
[10]  
Digital Equipment Corporation, 1999, TECH REP