Revisiting ARM Debugging Features: Nailgun and its Defense

نویسندگان

چکیده

Processors nowadays are consistently equipped with debugging features to facilitate program analysis. Specifically, the ARM architecture involves a series of CoreSight components and debug registers aid system debugging, group authentication signals designed restrict usage these registers. Meanwhile, security is under-examined since it normally requires physical access use in traditional model. However, introduces new model that no ARMv7, which exacerbates our concern on features. In this article, we perform comprehensive analysis summarize implications. To understand impact implications, also investigate platforms ARM-A different product domains (i.e., development boards, IoT devices, cloud servers, mobile devices). We consider investigation expose attacking surface universally exists architecture. verify concern, further craft Nailgun attack, obtains sensitive information (e.g., AES encryption key fingerprint image) achieves arbitrary payload execution high-privilege mode from low-privilege via misusing This attack does not rely software bugs, experiments show almost all investigated vulnerable attack. Our indicates ARM-R ARM-M may suffer same issue. defend against discuss potential mitigations perspectives ecosystem. Finally, practical defense mechanism based virtualization technology presented, evaluation result shows can prevent negligible performance penalty.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deception in Experiments: Revisiting the Arguments in Its Defense

In psychology, deception is commonly used to increase experimental control. Yet, its use has provoked concerns that it raises participants’ suspicions, prompts second-guessing of experimenters’ true intentions, and ultimately distorts behavior and endangers the control it is meant to achieve. Over time, these concerns regarding the methodological costs of the use of deception have been subjecte...

متن کامل

Ninja: Towards Transparent Tracing and Debugging on ARM

Existing malware analysis platforms leave detectable fingerprints like uncommon string properties in QEMU, signatures in Android Java virtual machine, and artifacts in Linux kernel profiles. Since these fingerprints provide the malware a chance to split its behavior depending on whether the analysis system is present or not, existing analysis systems are not sufficient to analyze the sophistica...

متن کامل

Revisiting the insanity defense: contested or consensus?

The author assesses the accuracy of both the public's opinion and researchers' conclusions regarding the method of adjudication of insanity cases and investigates the impact of the various types of reforms enacted in the 1980s on the degree to which insanity cases are contested. Data from seven states are analyzed. The public's view that insanity cases are typically resolved by a jury trial is ...

متن کامل

Frictional melanosis and its clinical and histopathological features

Background: A rippled type of pigmentation is observed on the arms, forearms, and bony prominences, more commonly in women with a history of chronic rubbing. The terminology (commonly referred to as frictional melanosis) and its relation with cutaneous amyloidosis has been debated. Materials and Methods: Twenty one patients with pigmented skin lesions with manifestations suggestive of frictiona...

متن کامل

Revisiting the CPS Transformation and its Implementation

We give a machine-checked definition and proof of semantic correctness for Danvy and Filinski’s properly tail-recursive, one-pass, call-by-value CPS transformation. We do so in the setting of the pure λ -calculus extended with a let construct. We propose a new first-order, one-pass, compositional formulation of the transformation. We point out that Danvy and Filinski’s simulation diagram does n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2023

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2021.3139840