Fault Attacks on Access Control in Processors: Threat, Formal Analysis and Microarchitectural Mitigation
نویسندگان
چکیده
Process isolation is a key component of the security architecture in any hardware/software system. However, even when implemented correctly and comprehensively at software (SW) level, process may be compromised by weaknesses hardware (HW). Therefore, HW an exhaustive verification desirable which provides needed formal guarantees ensuring confidentiality integrity microarchitecture. The situation further exacerbated if attacker able to inject faults, threat requiring additional attention analysis. In this paper, we consider model where faults and, same time, execute user-level programs. We show that poses severe systems have been hardened against fault attacks for specific, security-critical system software. For protection threat, present methodology access control processors, demonstrate how such are sustained presence injection. Guaranteeing correct robust crucial since it basis hardware. proposed approach implicitly models all possible single multiple bit flips as well stuck-at faults. leverage results our analysis augment with mechanisms guarantee w.r.t. considered model. At example several open source RISC-V both scalability efficiency generated defenses.
منابع مشابه
Preventative Directions For Insider Threat Mitigation Via Access Control
Much research on mitigating threat posed by insiders focuses on detection. In this chapter, we consider the prevention of attacks using access control While recent work and development in this space are promising, our studies of technologists in financial, health care, and other enterprise environments reveal a disconnect between what “real world” practitioners desire and what the research and ...
متن کاملMicroarchitectural Attacks and Countermeasures
Microarchitectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new area focuses on the effects of common processor components and their functionalities on the security of software cryptosystems. The main characteristic of microarchitectural attacks, which sets them aside from classical side-channel attacks, is the simple fact that they exploit the microarchitectura...
متن کاملSoftware-based Microarchitectural Attacks
Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leaka...
متن کاملFormal Analysis of Access Control Policies
We present a formal (model-based) approach to describing and analysing access control policies. This approach allows us to evaluate access requests against policies, compare versions of policies with each other and check policies for internal consistency. Access control policies are described using VDM, a statebased formal modelling language. Policy descriptions are concise and may be easily ma...
متن کاملFormal Methods and Access Control
Related Concepts – Access-control architectures – Formal verification – Identity management – Model-based development – Policy languages – Security policies Definition A formal method is any technique or method that aids in the construction and validation of computer-based systems and is based, in total or in part, on rigorous mathematics. Access control [8] refers to any method or mechanism by...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3280804