2015
DOI: 10.1007/978-3-319-13515-1
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Peripheral-based Attacks on the Host Memory

Abstract: Ich versichere von Eides statt, dass ich diese Dissertation selbständig verfasst und nur die angegebenen Quellen und Hilfsmittel verwendet habe. Datum i/ix Abstract Adversaries can deploy rootkit techniques on the target platform to persistently attack computer systems in a stealthy manner. Industrial and political espionage, surveillance of users as well as conducting cybercrime require stealthy attacks on computer systems. Utilizing a rootkit technique means, that a part of the implemented attack code is res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 59 publications
0
4
0
Order By: Relevance
“…Firmware attacks. There are several firmware-based attacks that target diverse devices [1,3,10,41,47,51]. Similar to the microcode attack in this paper, these attacks embed malicious code into the firmware to circumvent the platform's security while evading detection.…”
Section: Discussionmentioning
confidence: 99%
“…Firmware attacks. There are several firmware-based attacks that target diverse devices [1,3,10,41,47,51]. Similar to the microcode attack in this paper, these attacks embed malicious code into the firmware to circumvent the platform's security while evading detection.…”
Section: Discussionmentioning
confidence: 99%
“…We envision a verifier device to be attached to the main system bus via a DMA interface, similar in spirit to that of Intel's Manageability Engine or AMD's Platform Security Processor, but without flaws that would enable an attacker to plant malware in it [52]. These processors can operate independently of all other system components; e.g., even when all other components are powered down [67]. The external verifier could also run on a co-processor connected to the main system bus, similar in spirit to Ki-Mon ARM [41].…”
Section: A Verifier Channelmentioning
confidence: 99%
“…System components that are not directly addressable by CPU instructions or by trusted hardware modules enable malware to survive in non-volatile memories despite repeated power cycles, secure-and trusted-boot operations [56]; i.e., malware becomes persistent. For example, persistent malware has been found in the firmware of peripheral controllers [15], [43], [67], network interface cards [16], [17], disk controllers [5], [48], [60], [77], USB controllers [2], as well as routers and firewalls [5]. Naturally, persistent malware can infect the rest of the system state, and thus a remote adversary can retain long-term undetected control of a user's local system.…”
Section: Introductionmentioning
confidence: 99%
“…Compared to the existing work, our implementation proposal covers the hardware vulnerabilities which can be exploited by software applications or physical investigations of an IoT integrated circuit-more precisely attacks such as: snooping the bus; accessing the sensitive data stored in memories; memory inspection using DMA [20]; copying critical data using DMA reads [20,21]; hardware Trojans. All these attacks could be achieved with malicious programs gaining access to sensitive data, by exploiting hardware vulnerabilities.…”
Section: Security Threats and Related Workmentioning
confidence: 99%