DVFS类抗攻击方法(Trustzone&SGX)

安全之安全(security²)博客目录导读

DVFS类攻击原理&现有漏洞&抗攻击方法汇总


目录

一、抗攻击方法

1、业界INTEL已应用缓解措施

2、建议可采取缓解措施

 (1)硬件抗攻击缓解

 (2)软件抗攻击缓解


一、抗攻击方法

1、业界INTEL已应用缓解措施

DVFS类抗攻击方法(Trustzone&SGX)_第1张图片

DVFS类抗攻击方法(Trustzone&SGX)_第2张图片

DVFS类抗攻击方法(Trustzone&SGX)_第3张图片

2、建议可采取缓解措施

 (1)硬件抗攻击缓解

 DVFS类抗攻击方法(Trustzone&SGX)_第4张图片

DVFS类抗攻击方法(Trustzone&SGX)_第5张图片

DVFS类抗攻击方法(Trustzone&SGX)_第6张图片

DVFS类抗攻击方法(Trustzone&SGX)_第7张图片

DVFS类抗攻击方法(Trustzone&SGX)_第8张图片

DVFS类抗攻击方法(Trustzone&SGX)_第9张图片

DVFS类抗攻击方法(Trustzone&SGX)_第10张图片

DVFS类抗攻击方法(Trustzone&SGX)_第11张图片

DVFS类抗攻击方法(Trustzone&SGX)_第12张图片

 (2)软件抗攻击缓解

 DVFS类抗攻击方法(Trustzone&SGX)_第13张图片

 DVFS类抗攻击方法(Trustzone&SGX)_第14张图片DVFS类抗攻击方法(Trustzone&SGX)_第15张图片DVFS类抗攻击方法(Trustzone&SGX)_第16张图片DVFS类抗攻击方法(Trustzone&SGX)_第17张图片DVFS类抗攻击方法(Trustzone&SGX)_第18张图片DVFS类抗攻击方法(Trustzone&SGX)_第19张图片

参考

  1. Tang A, Sethumadhavan S, Stolfo S. {CLKSCREW}: Exposing the Perils of {Security-Oblivious} Energy Management[C]//26th USENIX Security Symposium (USENIX Security 17). 2017: 1057-1074.
  2. Zhang S, Tang A, Jiang Z, et al. Blacklist core: machine-learning based dynamic operating-performance-point blacklisting for mitigating power-management security attacks[C]//Proceedings of the International Symposium on Low Power Electronics and Design. 2018: 1-6.
  3. Murdock K, Oswald D, Garcia F D, et al. Plundervolt: Software-based fault injection attacks against Intel SGX[C]//2020 IEEE Symposium on Security and Privacy (SP). IEEE, 2020: 1466-1482.
  4. Murdock K, Oswald D, Garcia F D, et al. Plundervolt: How a little bit of undervolting can create a lot of trouble[J]. IEEE Security & Privacy, 2020, 18(5): 28-37.
  5. Kenjar Z, Frassetto T, Gens D, et al. {V0LTpwn}: Attacking x86 Processor Integrity from Software[C]//29th USENIX Security Symposium (USENIX Security 20). 2020: 1445-1461.
  6. Qiu P, Wang D, Lyu Y, et al. VoltJockey: Breaching TrustZone by software-controlled voltage manipulation over multi-core frequencies[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019: 195-209.
  7. Qui P, Wang D, Lyu Y, et al. VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone[J]. GetMobile: Mobile Computing and Communications, 2020, 24(2): 30-33.
  8. Qiu P, Wang D, Lyu Y, et al. VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, 40(6): 1130-1143.
  9. Qiu P, Wang D, Lyu Y, et al. VoltJockey: Breaking SGX by software-controlled voltage-induced hardware faults[C]//2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 2019: 1-6.
  10. Qiu P, Wang D, Lyu Y, et al. DVFSspy: Using Dynamic Voltage and Frequency Scaling as a Covert Channel for Multiple Procedures[C]//2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 2022: 654-659.

你可能感兴趣的:(安全与功耗,arm,安全架构)