MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms
Title | MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Silitonga, A., Gassoumi, H., Becker, J. |
Conference Name | 2020 IEEE 14th International Conference on Anti-counterfeiting, Security, and Identification (ASID) |
Date Published | Nov. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6879-1 |
Keywords | adapted words addition, all-programmable system-on-chip, AP SoC attacker, AP SoC victim, buffer overflow, Buffer overflow attack, command injection attacks, command-injection, command-injection-based attack, composability, Computer crime, cryptography, dynamic reconfiguration, field programmable gate arrays, FPGA dynamic configuration, Intellectual Property cores, Internet, Internet protocol, internetworked all programmable system-on-chip platforms, IP, Metrics, microarchitectural attack, microarchitecture, microcomputers, microprocessor chips, MiteS, Multiple Encryption, networked AP SoC platforms, PCS, personal computers, preventive countermeasure, Programming, Protocols, pubcrawl, resilience, Resiliency, return oriented programming, return-oriented programming, return-oriented programming attack, software-based microarchitectural attacks, stack protection, system-on-chip |
Abstract | The impact of microarchitectural attacks in Personal Computers (PCs) can be further adapted to and observed in internetworked All Programmable System-on-Chip (AP SoC) platforms. This effort involves the access control or execution of Intellectual Property cores in the FPGA of an AP SoC Victim internetworked with an AP SoC Attacker via Internet Protocol (IP). Three conceptions of attacks were implemented: buffer overflow attack at the stack, return-oriented programming attack, and command-injection-based attack for dynamic reconfiguration in the FPGA. Indeed, a specific preventive countermeasure for each attack is proposed. The functionality of the countermeasures mainly comprises adapted words addition (stack protection) for the first and second attacks and multiple encryption for the third attack. In conclusion, the recommended countermeasures are realizable to counteract the implemented attacks. |
URL | https://ieeexplore.ieee.org/document/9271734 |
DOI | 10.1109/ASID50160.2020.9271734 |
Citation Key | silitonga_mites_2020 |
- programming
- microarchitectural attack
- microarchitecture
- microcomputers
- microprocessor chips
- MiteS
- Multiple Encryption
- networked AP SoC platforms
- PCS
- personal computers
- preventive countermeasure
- Metrics
- Protocols
- pubcrawl
- resilience
- Resiliency
- return-oriented programming
- return-oriented programming attack
- software-based microarchitectural attacks
- stack protection
- system-on-chip
- Computer crime
- adapted words addition
- all-programmable system-on-chip
- AP SoC attacker
- AP SoC victim
- buffer overflow
- Buffer overflow attack
- command injection attacks
- command-injection
- command-injection-based attack
- composability
- return oriented programming
- Cryptography
- dynamic reconfiguration
- field programmable gate arrays
- FPGA dynamic configuration
- Intellectual Property cores
- internet
- Internet Protocol
- internetworked all programmable system-on-chip platforms
- IP