Information Security Theory and Practice by Maryline Laurent & Thanassis Giannetsos

Information Security Theory and Practice by Maryline Laurent & Thanassis Giannetsos

Author:Maryline Laurent & Thanassis Giannetsos
Language: eng
Format: epub
ISBN: 9783030417024
Publisher: Springer International Publishing


Using our method, we are able to determine that the faulted register is always rbx. There is a register corruption which sets the register to 0x0 in 8.7% of the cases corresponding to the fault model . In 56.53% of the cases, the faulted value comes from another register, these faulted values are 0x1 (register rax), 0x3 (register rdi) and 0x00007fXXXXXXXXXX (register rci with a different value for every execution of the tested program). The corresponding fault model is to set the instruction second operand to either 0x0, 0x2 or 0x5.

The last identified fault model is for the faulted value 0x2 and corresponds to the logical AND between rbx and r11. This happens in 13% of the cases and corresponds to set the opcode to 0x21 and the second operand to 0xb.

The remaining faults (21.78%) could not be determined with our method. However, the observed faulted values seems to correspond to values manipulated by the Linux OS layer. However, this investigation is out of the scope of this work and therefore not further explained.

Conclusion. With these results, we demonstrated that our method is reliable independently of the target architecture. However, on targets implementing optimizations (like the Intel Core i3), this approach is not exhaustive.

The analysis presented in Sects. 4.1 and 4.2 enable to model the fault at the Instruction Set Architecture (ISA) level. In other words, we can use this model to explain how the program execution is affected by our faults. With this knowledge it is possible to build some software countermeasures. But, as explained in Sect. 1.1, software countermeasures may become irrelevant because the faulted MAB is not clearly identified.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.