SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Downloaden Sie, um offline zu lesen
Cristofaro Mune
(c.mune@pulse-sec.com)
@pulsoid
Advancing FI attacks: Fault Models
opportunities
Password check
A simple password check
Can we bypass
this?
What do you think?
A better view
Traditional fault models
Control flow corruption
by skipping instructions
Data corruption
by flipping bits
Textbook attack
• If the check can be skipped...
• Execution falls through the right case.
- Regardless of the password.
• SUCCESS!
“Instruction skipping”
Case study:
Secure Boot
Secure Boot
Signature
Flash
(Attacker)
Boot stage
Code modified?  Hang
Signature
Flash
(Attacker)
Modified
Boot stage
Executing our code?
Signature
Flash
(Attacker)
Modified
Boot stage
How?
Textbook attack
Glitch here  Signature
bypass
Signature
Flash
(Attacker)
Arbitrary code execution
Modified
Boot stage
“Instruction skipping”
Secure Boot with countermeasures
Double signature check
Flash
(Attacker)
Random delays
Signature
Modified
Boot stage
But still doable!
Two faults (maybe) required
Flash
(Attacker)
Synchronization
more difficult
Signature
Modified
Boot stage
Case study:
Encrypted Secure Boot
Encrypted Secure Boot
Flash
(Normal)
Signature
Boot stage
(encrypted)
FI textbook attack insufficient
Signature bypass useless
Flash
(Normal)
Signature
Modified
Boot stage
Unknown encryption key
Security Certification
• Security Lab report:
- “We have not been able to bypass Secure Boot”
- “SCA attack needed for extracting encryption key
• CC Attack rating goes stellar
- If attack possible at all
• Product is SECURE
Reflections
Instruction...skipping???
• Convenience fault model
- Widely used for characterizing effects on SW execution
• Has limitations:
- Simplistic:
• focused on conditionals, single-point decisions.
- Not realistic:
• Research shows instructions are most likely “corrupted”. Not
skipped.
• Insufficient for precise modeling of attacks aimed at SW
execution.
IN 2018!? SERIOUSLY?
A different fault model
20
Remarks
• Limited control over which bit(s) will be corrupted
• Also includes other fault models as sub-cases (e.g. instruction skipping)
A generic one: “instruction corruption”*
*[FTDC 2016]: Spruyt, Timmers, Witteman
Controlling PC (or SP)
21
• ARM32 has an interesting ISA
• Program Counter (PC) is directly accessible
Attack variations (SP-control) also affect other architectures
Valid ARM instructions
Corrupted ARM instructions may directly set PC
Execution primitives…out of thin air
22
• ANY memory read can be redirected to PC (or SP)
- Hence, ANY memcpy()
• PC (or SP) immediately assigned with content from memory
- Following SW checks may not be executed
• A new target for FI:
- Security checks
- Crypto algorithms
- ...
Code Execution
Example: Secure Boot + countermeasures
Flash
(Attacker)
Glitch here  Code
execution at
stage_addr*
Signature
Modified
Boot stage
stage_addr*10000
Never executed
*also see [FDTC 2016]: Timmers, Spruyt,
Witteman
Analysis
• Assumptions:
- PC directly addressable (e.g. ARM32)
- Attackers knows code location
- Destination memory writable and executable:
• All FI SW countermeasures ineffective
- Fault Code execution transition happens in HW
• More nuanced for code execution achieved via SP-control
24
A SW attacker’s dream...
25
• Like a SW exploit. Without a SW vulnerability.
• ALL SW exploitation techniques fully applicable
- e.g. ROP, JOP, COP,… for SP-control
• SW exploitation mitigations can be effective
Defeating
Encrypted Secure Boot
Attack preparation
• We can apply the same fault model:
- Extends applicability of Timmers, Spruyt, Witteman technique (see
FTDC 2016 presentation)
- Also see Timmers, Spruyt @BlackHat 2016
• Strategy:
- Redirect control flow via PC hijacking Code execution
• In the running context!
- Signature check not executed Secure Boot bypass
- Decryption not executed Plaintext code execution
• Flash boot stage preparation:
- Execution payload
- “Sled” of PC target address
27
ROM code: secure boot + encryption
Flash
(Attacker)
Signature
Payload
(plaintext)
stage_addr*10000
Glitch while loading
pointers  Code exec
at stage_addr*
Never executed
Analysis
• Signature verification not performed
- Secure boot deafeated
• Decryption not performed
- Plaintext code execution
• Code execution achieved in verifying stage context
• ROM-level code execution
29
Countermeasures
• Hardware FI countermeasures fully applicable
- Detect glitch injection or fault generation
• FI SW countermeasures likely not executed
- A successful attack hijacks control flow immediately
• Localized software FI countermeasures are insufficient
− Any instruction is a potential target for corruption
Analysis
• Fully applicable.
• Relevant: Limiting usage of an hijacked control flow
− DEP/NX
− ASLR
− CFI
− …
• Irrelevant: Preventing control flow hijacking:
− Stack cookies
− SEHOP
− …
SW Exploit mitigations
Recommendations
• Use FI HW countermeasures for prevention
- Applicable regardless of fault model
• FI SW countermeasures can only mitigate “classical attacks”
• Adopt modern SW security paradygms:
- SW exploit mitigations
- Defense in depth
- Secure SDLC
- ...
• Learn from:
- SW attackers
- SW and Mobile security industry
33
Final thoughts
A new attack
• Technique for bypassing encrypted secure boot:
- One single fault
- ROM-level code execution
- Arbitrary plaintext payload
- No encryption key needed
35
Advancing FI
• Different fault models can yield dramatically different results
• Simplistic fault modeling can be dangerous:
- High impact attacks may go undetected for decades
• SW execution integrity is critical nowadays:
- Must be fully in scope for FI
• Must also fall scope for modern HW security industry, in general
36
HW & SW security
• HW and SW attacks more intertwined:
- Also see micro-architectural attacks
- Unexpected implications
• HW security industry needs SW security experts
- And viceversa
• We need more “in between” expertise:
- Single domain expertise not sufficient anymore
• Attackers’ and engineers’ perspectives need blending
• Holystic, system-level view needed
37
Finally...
• If your HW and SW security engineering teams...
• do not talk to each other...
38
You are likely doing it wrong.
Cristofaro Mune
Product Security Consultant
Contacts
c.mune@pulse-sec.com

Weitere ähnliche Inhalte

Was ist angesagt?

Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2PacSecJP
 
Top 10 secure boot mistakes
Top 10 secure boot mistakesTop 10 secure boot mistakes
Top 10 secure boot mistakesJustin Black
 
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugsOWASP
 
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)Shota Shinogi
 
Predicting and Abusing WPA2/802.11 Group Keys
Predicting and Abusing WPA2/802.11 Group KeysPredicting and Abusing WPA2/802.11 Group Keys
Predicting and Abusing WPA2/802.11 Group Keysvanhoefm
 
Kavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finKavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finPacSecJP
 
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs VulnerabilityYour Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs VulnerabilityPriyanka Aash
 
CrySys guest-lecture: Virtual machine introspection on modern hardware
CrySys guest-lecture: Virtual machine introspection on modern hardwareCrySys guest-lecture: Virtual machine introspection on modern hardware
CrySys guest-lecture: Virtual machine introspection on modern hardwareTamas K Lengyel
 
Security Testing: Fuzzing
Security Testing: FuzzingSecurity Testing: Fuzzing
Security Testing: FuzzingAndrei Rubaniuk
 
Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1 Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1 Luis Grangeia
 
Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Zigoo0
 
Оптимізація процесу відлагоджування Embedded рішень, Богдан Костів
Оптимізація процесу відлагоджування Embedded рішень, Богдан КостівОптимізація процесу відлагоджування Embedded рішень, Богдан Костів
Оптимізація процесу відлагоджування Embedded рішень, Богдан КостівSigma Software
 
Virtual Machine Introspection with Xen
Virtual Machine Introspection with XenVirtual Machine Introspection with Xen
Virtual Machine Introspection with XenTamas K Lengyel
 
OSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner FischerOSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner FischerNETWAYS
 

Was ist angesagt? (15)

Fuzzing
FuzzingFuzzing
Fuzzing
 
Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2
 
Top 10 secure boot mistakes
Top 10 secure boot mistakesTop 10 secure boot mistakes
Top 10 secure boot mistakes
 
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
 
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
 
Predicting and Abusing WPA2/802.11 Group Keys
Predicting and Abusing WPA2/802.11 Group KeysPredicting and Abusing WPA2/802.11 Group Keys
Predicting and Abusing WPA2/802.11 Group Keys
 
Kavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finKavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_fin
 
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs VulnerabilityYour Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
 
CrySys guest-lecture: Virtual machine introspection on modern hardware
CrySys guest-lecture: Virtual machine introspection on modern hardwareCrySys guest-lecture: Virtual machine introspection on modern hardware
CrySys guest-lecture: Virtual machine introspection on modern hardware
 
Security Testing: Fuzzing
Security Testing: FuzzingSecurity Testing: Fuzzing
Security Testing: Fuzzing
 
Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1 Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1
 
Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!
 
Оптимізація процесу відлагоджування Embedded рішень, Богдан Костів
Оптимізація процесу відлагоджування Embedded рішень, Богдан КостівОптимізація процесу відлагоджування Embedded рішень, Богдан Костів
Оптимізація процесу відлагоджування Embedded рішень, Богдан Костів
 
Virtual Machine Introspection with Xen
Virtual Machine Introspection with XenVirtual Machine Introspection with Xen
Virtual Machine Introspection with Xen
 
OSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner FischerOSMC 2014: Server Hardware Monitoring done right | Werner Fischer
OSMC 2014: Server Hardware Monitoring done right | Werner Fischer
 

Ähnlich wie PANDA2018 - Advancing FI attacks - Fault Models opportunities

BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat Security Conference
 
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & DefensesSecure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & DefensesRiscure
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsCaptain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsenSilo
 
Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPiratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPriyanka Aash
 
Secure programming - Computer and Network Security
Secure programming - Computer and Network SecuritySecure programming - Computer and Network Security
Secure programming - Computer and Network Securityssuser30902e
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityClaus Cramon Houmann
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
System-level Threats: Dangerous Assumptions in modern Product Security
System-level Threats: Dangerous Assumptions in modern Product SecuritySystem-level Threats: Dangerous Assumptions in modern Product Security
System-level Threats: Dangerous Assumptions in modern Product SecurityCristofaro Mune
 
Effective approaches to web application security
Effective approaches to web application security Effective approaches to web application security
Effective approaches to web application security Zane Lackey
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacksgocybersec
 
Emulation-based SW protection
Emulation-based SW protectionEmulation-based SW protection
Emulation-based SW protectionabdullah roomi
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIIvo Andreev
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022lior mazor
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-daysZoltan Balazs
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZeditsRod Soto
 
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...CODE BLUE
 

Ähnlich wie PANDA2018 - Advancing FI attacks - Fault Models opportunities (20)

BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
 
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & DefensesSecure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses
 
Buffer overflows
Buffer overflowsBuffer overflows
Buffer overflows
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsCaptain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
 
Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPiratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigation
 
Secure programming - Computer and Network Security
Secure programming - Computer and Network SecuritySecure programming - Computer and Network Security
Secure programming - Computer and Network Security
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
System-level Threats: Dangerous Assumptions in modern Product Security
System-level Threats: Dangerous Assumptions in modern Product SecuritySystem-level Threats: Dangerous Assumptions in modern Product Security
System-level Threats: Dangerous Assumptions in modern Product Security
 
Effective approaches to web application security
Effective approaches to web application security Effective approaches to web application security
Effective approaches to web application security
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
Emulation-based SW protection
Emulation-based SW protectionEmulation-based SW protection
Emulation-based SW protection
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AI
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-days
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
 
Ns
NsNs
Ns
 
Secure Coding in C/C++
Secure Coding in C/C++Secure Coding in C/C++
Secure Coding in C/C++
 
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
[CB16] COFI break – Breaking exploits with Processor trace and Practical cont...
 

Kürzlich hochgeladen

萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程1k98h0e1
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...Amil baba
 
existing product research b2 Sunderland Culture
existing product research b2 Sunderland Cultureexisting product research b2 Sunderland Culture
existing product research b2 Sunderland CultureChloeMeadows1
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxLeaMaePahinagGarciaV
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一C SSS
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一diploma 1
 
Hifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightHifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightKomal Khan
 
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesVip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls in Delhi
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...Amil Baba Dawood bangali
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)861c7ca49a02
 
Hindu amil baba kala jadu expert in pakistan islamabad lahore karachi atar ...
Hindu amil baba kala jadu expert  in pakistan islamabad lahore karachi atar  ...Hindu amil baba kala jadu expert  in pakistan islamabad lahore karachi atar  ...
Hindu amil baba kala jadu expert in pakistan islamabad lahore karachi atar ...amilabibi1
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证gwhohjj
 
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...ttt fff
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubaikojalkojal131
 
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作f3774p8b
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRdollysharma2066
 
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 

Kürzlich hochgeladen (20)

萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
 
existing product research b2 Sunderland Culture
existing product research b2 Sunderland Cultureexisting product research b2 Sunderland Culture
existing product research b2 Sunderland Culture
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptx
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
 
Hifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightHifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun Tonight
 
young call girls in Khanpur,🔝 9953056974 🔝 escort Service
young call girls in  Khanpur,🔝 9953056974 🔝 escort Serviceyoung call girls in  Khanpur,🔝 9953056974 🔝 escort Service
young call girls in Khanpur,🔝 9953056974 🔝 escort Service
 
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesVip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
Hindu amil baba kala jadu expert in pakistan islamabad lahore karachi atar ...
Hindu amil baba kala jadu expert  in pakistan islamabad lahore karachi atar  ...Hindu amil baba kala jadu expert  in pakistan islamabad lahore karachi atar  ...
Hindu amil baba kala jadu expert in pakistan islamabad lahore karachi atar ...
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
 
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
毕业文凭制作#回国入职#diploma#degree美国威斯康星大学麦迪逊分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#d...
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
 
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
Erfurt FH学位证,埃尔福特应用技术大学毕业证书1:1制作
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
 
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 

PANDA2018 - Advancing FI attacks - Fault Models opportunities

  • 3. A simple password check Can we bypass this? What do you think?
  • 5. Traditional fault models Control flow corruption by skipping instructions Data corruption by flipping bits
  • 6. Textbook attack • If the check can be skipped... • Execution falls through the right case. - Regardless of the password. • SUCCESS! “Instruction skipping”
  • 9. Code modified?  Hang Signature Flash (Attacker) Modified Boot stage
  • 11. Textbook attack Glitch here  Signature bypass Signature Flash (Attacker) Arbitrary code execution Modified Boot stage “Instruction skipping”
  • 12. Secure Boot with countermeasures Double signature check Flash (Attacker) Random delays Signature Modified Boot stage
  • 13. But still doable! Two faults (maybe) required Flash (Attacker) Synchronization more difficult Signature Modified Boot stage
  • 16. FI textbook attack insufficient Signature bypass useless Flash (Normal) Signature Modified Boot stage Unknown encryption key
  • 17. Security Certification • Security Lab report: - “We have not been able to bypass Secure Boot” - “SCA attack needed for extracting encryption key • CC Attack rating goes stellar - If attack possible at all • Product is SECURE
  • 19. Instruction...skipping??? • Convenience fault model - Widely used for characterizing effects on SW execution • Has limitations: - Simplistic: • focused on conditionals, single-point decisions. - Not realistic: • Research shows instructions are most likely “corrupted”. Not skipped. • Insufficient for precise modeling of attacks aimed at SW execution. IN 2018!? SERIOUSLY?
  • 20. A different fault model 20 Remarks • Limited control over which bit(s) will be corrupted • Also includes other fault models as sub-cases (e.g. instruction skipping) A generic one: “instruction corruption”* *[FTDC 2016]: Spruyt, Timmers, Witteman
  • 21. Controlling PC (or SP) 21 • ARM32 has an interesting ISA • Program Counter (PC) is directly accessible Attack variations (SP-control) also affect other architectures Valid ARM instructions Corrupted ARM instructions may directly set PC
  • 22. Execution primitives…out of thin air 22 • ANY memory read can be redirected to PC (or SP) - Hence, ANY memcpy() • PC (or SP) immediately assigned with content from memory - Following SW checks may not be executed • A new target for FI: - Security checks - Crypto algorithms - ... Code Execution
  • 23. Example: Secure Boot + countermeasures Flash (Attacker) Glitch here  Code execution at stage_addr* Signature Modified Boot stage stage_addr*10000 Never executed *also see [FDTC 2016]: Timmers, Spruyt, Witteman
  • 24. Analysis • Assumptions: - PC directly addressable (e.g. ARM32) - Attackers knows code location - Destination memory writable and executable: • All FI SW countermeasures ineffective - Fault Code execution transition happens in HW • More nuanced for code execution achieved via SP-control 24
  • 25. A SW attacker’s dream... 25 • Like a SW exploit. Without a SW vulnerability. • ALL SW exploitation techniques fully applicable - e.g. ROP, JOP, COP,… for SP-control • SW exploitation mitigations can be effective
  • 27. Attack preparation • We can apply the same fault model: - Extends applicability of Timmers, Spruyt, Witteman technique (see FTDC 2016 presentation) - Also see Timmers, Spruyt @BlackHat 2016 • Strategy: - Redirect control flow via PC hijacking Code execution • In the running context! - Signature check not executed Secure Boot bypass - Decryption not executed Plaintext code execution • Flash boot stage preparation: - Execution payload - “Sled” of PC target address 27
  • 28. ROM code: secure boot + encryption Flash (Attacker) Signature Payload (plaintext) stage_addr*10000 Glitch while loading pointers  Code exec at stage_addr* Never executed
  • 29. Analysis • Signature verification not performed - Secure boot deafeated • Decryption not performed - Plaintext code execution • Code execution achieved in verifying stage context • ROM-level code execution 29
  • 31. • Hardware FI countermeasures fully applicable - Detect glitch injection or fault generation • FI SW countermeasures likely not executed - A successful attack hijacks control flow immediately • Localized software FI countermeasures are insufficient − Any instruction is a potential target for corruption Analysis
  • 32. • Fully applicable. • Relevant: Limiting usage of an hijacked control flow − DEP/NX − ASLR − CFI − … • Irrelevant: Preventing control flow hijacking: − Stack cookies − SEHOP − … SW Exploit mitigations
  • 33. Recommendations • Use FI HW countermeasures for prevention - Applicable regardless of fault model • FI SW countermeasures can only mitigate “classical attacks” • Adopt modern SW security paradygms: - SW exploit mitigations - Defense in depth - Secure SDLC - ... • Learn from: - SW attackers - SW and Mobile security industry 33
  • 35. A new attack • Technique for bypassing encrypted secure boot: - One single fault - ROM-level code execution - Arbitrary plaintext payload - No encryption key needed 35
  • 36. Advancing FI • Different fault models can yield dramatically different results • Simplistic fault modeling can be dangerous: - High impact attacks may go undetected for decades • SW execution integrity is critical nowadays: - Must be fully in scope for FI • Must also fall scope for modern HW security industry, in general 36
  • 37. HW & SW security • HW and SW attacks more intertwined: - Also see micro-architectural attacks - Unexpected implications • HW security industry needs SW security experts - And viceversa • We need more “in between” expertise: - Single domain expertise not sufficient anymore • Attackers’ and engineers’ perspectives need blending • Holystic, system-level view needed 37
  • 38. Finally... • If your HW and SW security engineering teams... • do not talk to each other... 38 You are likely doing it wrong.
  • 39.
  • 40. Cristofaro Mune Product Security Consultant Contacts c.mune@pulse-sec.com