Fault Attacks on Access Control in Processors: Threat, Formal Analysis and Microarchitectural Mitigation

نویسندگان

چکیده

Process isolation is a key component of the security architecture in any hardware/software system. However, even when implemented correctly and comprehensively at software (SW) level, process may be compromised by weaknesses hardware (HW). Therefore, HW an exhaustive verification desirable which provides needed formal guarantees ensuring confidentiality integrity microarchitecture. The situation further exacerbated if attacker able to inject faults, threat requiring additional attention analysis. In this paper, we consider model where faults and, same time, execute user-level programs. We show that poses severe systems have been hardened against fault attacks for specific, security-critical system software. For protection threat, present methodology access control processors, demonstrate how such are sustained presence injection. Guaranteeing correct robust crucial since it basis hardware. proposed approach implicitly models all possible single multiple bit flips as well stuck-at faults. leverage results our analysis augment with mechanisms guarantee w.r.t. considered model. At example several open source RISC-V both scalability efficiency generated defenses.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventative Directions For Insider Threat Mitigation Via Access Control

Much research on mitigating threat posed by insiders focuses on detection. In this chapter, we consider the prevention of attacks using access control While recent work and development in this space are promising, our studies of technologists in financial, health care, and other enterprise environments reveal a disconnect between what “real world” practitioners desire and what the research and ...

متن کامل

Microarchitectural Attacks and Countermeasures

Microarchitectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new area focuses on the effects of common processor components and their functionalities on the security of software cryptosystems. The main characteristic of microarchitectural attacks, which sets them aside from classical side-channel attacks, is the simple fact that they exploit the microarchitectura...

متن کامل

Software-based Microarchitectural Attacks

Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leaka...

متن کامل

Formal Analysis of Access Control Policies

We present a formal (model-based) approach to describing and analysing access control policies. This approach allows us to evaluate access requests against policies, compare versions of policies with each other and check policies for internal consistency. Access control policies are described using VDM, a statebased formal modelling language. Policy descriptions are concise and may be easily ma...

متن کامل

Formal Methods and Access Control

Related Concepts – Access-control architectures – Formal verification – Identity management – Model-based development – Policy languages – Security policies Definition A formal method is any technique or method that aids in the construction and validation of computer-based systems and is based, in total or in part, on rigorous mathematics. Access control [8] refers to any method or mechanism by...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3280804