DVFS类现有漏洞(Trustzone&SGX)

安全之安全(security²)博客目录导读

DVFS类攻击原理&现有漏洞&抗攻击方法汇总 


目录

一、DVFS类现有漏洞

1、超频攻击

(1)CLKSCREW

2、欠压攻击CVE-2019-11157

(1)Plundervolt

(2)V0LTpwn

(3)VoltJockey

针对ARM

针对INTEL


一、DVFS类现有漏洞

1、超频攻击

1)CLKSCREW

DVFS类现有漏洞(Trustzone&SGX)_第1张图片

DVFS类现有漏洞(Trustzone&SGX)_第2张图片DVFS类现有漏洞(Trustzone&SGX)_第3张图片 DVFS类现有漏洞(Trustzone&SGX)_第4张图片

2、欠压攻击CVE-2019-11157

 DVFS类现有漏洞(Trustzone&SGX)_第5张图片

DVFS类现有漏洞(Trustzone&SGX)_第6张图片

1)Plundervolt

DVFS类现有漏洞(Trustzone&SGX)_第7张图片

 DVFS类现有漏洞(Trustzone&SGX)_第8张图片

 DVFS类现有漏洞(Trustzone&SGX)_第9张图片

 DVFS类现有漏洞(Trustzone&SGX)_第10张图片

2)V0LTpwn

DVFS类现有漏洞(Trustzone&SGX)_第11张图片

DVFS类现有漏洞(Trustzone&SGX)_第12张图片

 DVFS类现有漏洞(Trustzone&SGX)_第13张图片

DVFS类现有漏洞(Trustzone&SGX)_第14张图片

(3)VoltJockey

针对ARM

 DVFS类现有漏洞(Trustzone&SGX)_第15张图片

 DVFS类现有漏洞(Trustzone&SGX)_第16张图片

 DVFS类现有漏洞(Trustzone&SGX)_第17张图片

DVFS类现有漏洞(Trustzone&SGX)_第18张图片

针对INTEL

DVFS类现有漏洞(Trustzone&SGX)_第19张图片

DVFS类现有漏洞(Trustzone&SGX)_第20张图片

 DVFS类现有漏洞(Trustzone&SGX)_第21张图片

DVFS类现有漏洞(Trustzone&SGX)_第22张图片

DVFS类现有漏洞(Trustzone&SGX)_第23张图片

DVFS类现有漏洞(Trustzone&SGX)_第24张图片

DVFS类现有漏洞(Trustzone&SGX)_第25张图片

参考

  1. Tang A, Sethumadhavan S, Stolfo S. {CLKSCREW}: Exposing the Perils of {Security-Oblivious} Energy Management[C]//26th USENIX Security Symposium (USENIX Security 17). 2017: 1057-1074.
  2. Zhang S, Tang A, Jiang Z, et al. Blacklist core: machine-learning based dynamic operating-performance-point blacklisting for mitigating power-management security attacks[C]//Proceedings of the International Symposium on Low Power Electronics and Design. 2018: 1-6.
  3. Murdock K, Oswald D, Garcia F D, et al. Plundervolt: Software-based fault injection attacks against Intel SGX[C]//2020 IEEE Symposium on Security and Privacy (SP). IEEE, 2020: 1466-1482.
  4. Murdock K, Oswald D, Garcia F D, et al. Plundervolt: How a little bit of undervolting can create a lot of trouble[J]. IEEE Security & Privacy, 2020, 18(5): 28-37.
  5. Kenjar Z, Frassetto T, Gens D, et al. {V0LTpwn}: Attacking x86 Processor Integrity from Software[C]//29th USENIX Security Symposium (USENIX Security 20). 2020: 1445-1461.
  6. Qiu P, Wang D, Lyu Y, et al. VoltJockey: Breaching TrustZone by software-controlled voltage manipulation over multi-core frequencies[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019: 195-209.
  7. Qui P, Wang D, Lyu Y, et al. VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone[J]. GetMobile: Mobile Computing and Communications, 2020, 24(2): 30-33.
  8. Qiu P, Wang D, Lyu Y, et al. VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, 40(6): 1130-1143.
  9. Qiu P, Wang D, Lyu Y, et al. VoltJockey: Breaking SGX by software-controlled voltage-induced hardware faults[C]//2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 2019: 1-6.
  10. Qiu P, Wang D, Lyu Y, et al. DVFSspy: Using Dynamic Voltage and Frequency Scaling as a Covert Channel for Multiple Procedures[C]//2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 2022: 654-659.

你可能感兴趣的:(安全与功耗,安全架构,arm)