Visible to the public Let's Shock Our IoT's Heart: ARMv7-M Under (Fault) Attacks

TitleLet's Shock Our IoT's Heart: ARMv7-M Under (Fault) Attacks
Publication TypeConference Paper
Year of Publication2018
AuthorsBukasa, Sebanjila K., Lashermes, Ronan, Lanet, Jean-Louis, Leqay, Axel
Conference NameProceedings of the 13th International Conference on Availability, Reliability and Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6448-5
KeywordsBackdoor, buffer overflow, composability, Electromagnetic Fault Injection (EMFI), fault injection, Human Behavior, human factors, microcontroller, physical attacks, pubcrawl, resilience, Resiliency, return oriented programming, rop attacks, Scalability, Vulnerability Insertion
Abstract

A fault attack is a well-known technique where the behaviour of a chip is voluntarily disturbed by hardware means in order to undermine the security of the information handled by the target. In this paper, we explore how Electromagnetic fault injection (EMFI) can be used to create vulnerabilities in sound software, targeting a Cortex-M3 microcontroller. Several use-cases are shown experimentally: control flow hijacking, buffer overflow (even with the presence of a canary), covert backdoor insertion and Return Oriented Programming can be achieved even if programs are not vulnerable in a software point of view. These results suggest that the protection of any software against vulnerabilities must take hardware into account as well.

URLhttps://dl.acm.org/citation.cfm?doid=3230833.3230842
DOI10.1145/3230833.3230842
Citation Keybukasa_lets_2018