TU Darmstadt / ULB / TUbiblio

When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs

Dessouky, Ghada and Gens, David and Haney, Patrick and Persyn, Garrett and Kanuparthi, Arun K. and Khattri, Hareesh and Fung, Jason M. and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan :
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
[Online-Edition: http://arxiv.org/abs/1812.00197]
In: Cryptography and Security, abs/1812.00197
[Article] , (2018)

Official URL: http://arxiv.org/abs/1812.00197

Abstract

Modern computer systems are becoming faster, more efficient, and increasingly interconnected with each generation. Consequently, these platforms also grow more complex, with continuously new features introducing the possibility of new bugs. Hence, the semiconductor industry employs a combination of different verification techniques to ensure the security of System-on-Chip (SoC) designs during the development life cycle. However, a growing number of increasingly sophisticated attacks are starting to leverage cross-layer bugs by exploiting subtle interactions between hardware and software, as recently demonstrated through a series of real-world exploits with significant security impact that affected all major hardware vendors.

Item Type: Article
Erschienen: 2018
Creators: Dessouky, Ghada and Gens, David and Haney, Patrick and Persyn, Garrett and Kanuparthi, Arun K. and Khattri, Hareesh and Fung, Jason M. and Sadeghi, Ahmad-Reza and Rajendran, Jeyavijayan
Title: When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs
Language: English
Abstract:

Modern computer systems are becoming faster, more efficient, and increasingly interconnected with each generation. Consequently, these platforms also grow more complex, with continuously new features introducing the possibility of new bugs. Hence, the semiconductor industry employs a combination of different verification techniques to ensure the security of System-on-Chip (SoC) designs during the development life cycle. However, a growing number of increasingly sophisticated attacks are starting to leverage cross-layer bugs by exploiting subtle interactions between hardware and software, as recently demonstrated through a series of real-world exploits with significant security impact that affected all major hardware vendors.

Journal or Publication Title: Cryptography and Security
Volume: abs/1812.00197
Uncontrolled Keywords: Primitives; P3
Divisions: Department of Computer Science
Department of Computer Science > System Security Lab
DFG-Collaborative Research Centres (incl. Transregio)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Date Deposited: 15 Jan 2019 10:48
Official URL: http://arxiv.org/abs/1812.00197
Export:

Optionen (nur für Redakteure)

View Item View Item