Let's shock our IoT's heart: ARMv7-M under (fault) attacks - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2018

Let's shock our IoT's heart: ARMv7-M under (fault) attacks

Résumé

A fault attack is a well-known technique where the behaviour of a chip is voluntarily disturbed by hardware means in order to undermine the security of the information handled by the target. In this paper, we explore how Electromagnetic fault injection (EMFI) can be used to create vulnerabilities in sound software, targeting a Cortex-M3 microcontroller. Several use-cases are shown experimentally: control flow hijacking, buffer overflow (even with the presence of a canary), covert backdoor insertion and Return Oriented Programming can be achieved even if programs are not vulnerable in a software point of view. These results suggest that the protection of any software against vulnerabilities must take hardware into account as well.
Fichier principal
Vignette du fichier
ares18.pdf (1.25 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01950842 , version 1 (12-12-2018)

Identifiants

Citer

Sebanjila Kevin Bukasa, Ronan Lashermes, Jean-Louis Lanet, Axel Legay. Let's shock our IoT's heart: ARMv7-M under (fault) attacks. ARES 2018 - 13th International Conference on Availability, Reliability and Security, Aug 2018, Hambourg, Germany. pp.1-6, ⟨10.1145/3230833.3230842⟩. ⟨hal-01950842⟩
179 Consultations
543 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More