Visible to the public Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems

TitleAnalysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Publication TypeConference Paper
Year of Publication2020
AuthorsKostromitin, K. I., Dokuchaev, B. N., Kozlov, D. A.
Conference Name2020 International Russian Automation Conference (RusAutoCon)
Date Publishedsep
Keywordsauthorisation, composability, Computer crime, computer viruses, Computers, cryptography, data protection, encryption program, File systems, Hardware, hardware algorithm protection, hardware vulnerabilities, hardware vulnerability, information protection, Information security, invasive software, local computer calculation network, Metrics, microcomputers, microprocessor systems, Microsoft Windows (operating systems), network access, Production, Program processors, pubcrawl, remote attack, resilience, Resiliency, security, Server Message Block service, Silicon, Software Vulnerability, Transistors, WannaCry trojan encoder, Windows operating system, Windows Operating System Security, Windows OS
Abstract

The relevance of data protection is related to the intensive informatization of various aspects of society and the need to prevent unauthorized access to them. World spending on ensuring information security (IS) for the current state: expenses in the field of IS today amount to \$81.7 billion. Expenditure forecast by 2020: about \$105 billion [1]. Information protection of military facilities is the most critical in the public sector, in the non-state - financial organizations is one of the leaders in spending on information protection. An example of the importance of IS research is the Trojan encoder WannaCry, which infected hundreds of thousands of computers around the world, attacks are recorded in more than 116 countries. The attack of the encoder of WannaCry (Wana Decryptor) happens through a vulnerability in service Server Message Block (protocol of network access to file systems) of Windows OS. Then, a rootkit (a set of malware) was installed on the infected system, using which the attackers launched an encryption program. Then each vulnerable computer could become infected with another infected device within one local network. Due to these attacks, about \$70,000 was lost (according to data from 18.05.2017) [2]. It is assumed in the presented work, that the software level of information protection is fundamentally insufficient to ensure the stable functioning of critical objects. This is due to the possible hardware implementation of undocumented instructions, discussed later. The complexity of computing systems and the degree of integration of their components are constantly growing. Therefore, monitoring the operation of the computer hardware is necessary to achieve the maximum degree of protection, in particular, data processing methods.

DOI10.1109/RusAutoCon49822.2020.9208037
Citation Keykostromitin_analysis_2020