TU Darmstadt / ULB / TUbiblio

When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan :
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
[Online-Edition: http://arxiv.org/abs/1812.00197]
In: Cryptography and Security, abs/1812.00197
[Artikel] , (2018)

Offizielle URL: http://arxiv.org/abs/1812.00197

Kurzbeschreibung (Abstract)

Modern computer systems are becoming faster, more efficient, and increasingly interconnected with each generation. Consequently, these platforms also grow more complex, with continuously new features introducing the possibility of new bugs. Hence, the semiconductor industry employs a combination of different verification techniques to ensure the security of System-on-Chip (SoC) designs during the development life cycle. However, a growing number of increasingly sophisticated attacks are starting to leverage cross-layer bugs by exploiting subtle interactions between hardware and software, as recently demonstrated through a series of real-world exploits with significant security impact that affected all major hardware vendors.

Typ des Eintrags: Artikel
Erschienen: 2018
Autor(en): Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan
Titel: When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs
Sprache: Englisch
Kurzbeschreibung (Abstract):

Modern computer systems are becoming faster, more efficient, and increasingly interconnected with each generation. Consequently, these platforms also grow more complex, with continuously new features introducing the possibility of new bugs. Hence, the semiconductor industry employs a combination of different verification techniques to ensure the security of System-on-Chip (SoC) designs during the development life cycle. However, a growing number of increasingly sophisticated attacks are starting to leverage cross-layer bugs by exploiting subtle interactions between hardware and software, as recently demonstrated through a series of real-world exploits with significant security impact that affected all major hardware vendors.

Titel der Zeitschrift, Zeitung oder Schriftenreihe: Cryptography and Security
Band: abs/1812.00197
Freie Schlagworte: Primitives; P3
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Systemsicherheit
DFG-Sonderforschungsbereiche (inkl. Transregio)
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche
Profilbereiche
Profilbereiche > Cybersicherheit (CYSEC)
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen
Hinterlegungsdatum: 15 Jan 2019 10:48
Offizielle URL: http://arxiv.org/abs/1812.00197
Export:

Optionen (nur für Redakteure)

Eintrag anzeigen Eintrag anzeigen