Protecting Data In-Use from Firmware and Physical Attacks

نویسنده

  • Stephen Weis
چکیده

Defending computers from unauthorized physical access, malicious hardware devices, or other low-level attacks has proven extremely challenging. The risks from these attacks are exacerbated in cloud-computing environments, where users lack physical control over servers executing their workloads. This paper reviews several firmware and physical attacks against x86 platforms, including bootkits, ”cold booting”, and malicious devices. We discuss several existing tools and technologies that can mitigate these risk such as Trusted Execution Technology (TXT) and main memory encryption. We will also discuss upcoming technologies that may help protect against firmware and physical threats.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Boot: An Effective, Low-Risk Alternative to Commercial Solutions

Introduction In today’s world, where adversaries use the cyber domain and global manufacturing operations as platforms for attacks, protecting and maintaining the embedded systems that constitute the backbone of critical infrastructure is increasingly important. These systems carry critical communications and must have built-in robust defenses against cyber-attacks from the beginning of the pro...

متن کامل

Attacks on fitness trackers revisited: a case-study of unfit firmware security

Fitness trackers – wearables that continuously record a wearer’s step count and related activity data – are quickly gaining in popularity. Apart from being useful for individuals seeking a more healthy lifestyle, their data is also being used in court and by insurance companies to adjust premiums. For these use cases, it is essential to ensure authenticity and integrity of data. Here we demonst...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

Acquisition and analysis of compromised firmware using memory forensics

To a great degree, research in memory forensics concentrates on the acquisition and analysis of kerneland user-space software from physical memory to date. With the system firmware, a much more privileged software layer exists in modern computer systems though that has recently become the target in sophisticated computer attacks more often. Compromise strategies used by high profile rootkits ar...

متن کامل

Protection des systèmes informatiques contre les attaques par entrées-sorties. (Protecting Computer Systems against Input/Output Attacks)

Nowadays, attacks against computer systems may involve hardware components inorder to bypass the numerous countermeasures against malicious software. This PhD thesisfocuses on this novel class of attacks and specifically deals with Input/Output attacks. In suchattacks, attackers divert legitimate hardware features, such as I/O mechanisms, to achieve dif-ferent malicious actions....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014