Information Security Theory and Practice by Maryline Laurent & Thanassis Giannetsos
Author:Maryline Laurent & Thanassis Giannetsos
Language: eng
Format: epub
ISBN: 9783030417024
Publisher: Springer International Publishing
Using our method, we are able to determine that the faulted register is always rbx. There is a register corruption which sets the register to 0x0 in 8.7% of the cases corresponding to the fault model . In 56.53% of the cases, the faulted value comes from another register, these faulted values are 0x1 (register rax), 0x3 (register rdi) and 0x00007fXXXXXXXXXX (register rci with a different value for every execution of the tested program). The corresponding fault model is to set the instruction second operand to either 0x0, 0x2 or 0x5.
The last identified fault model is for the faulted value 0x2 and corresponds to the logical AND between rbx and r11. This happens in 13% of the cases and corresponds to set the opcode to 0x21 and the second operand to 0xb.
The remaining faults (21.78%) could not be determined with our method. However, the observed faulted values seems to correspond to values manipulated by the Linux OS layer. However, this investigation is out of the scope of this work and therefore not further explained.
Conclusion. With these results, we demonstrated that our method is reliable independently of the target architecture. However, on targets implementing optimizations (like the Intel Core i3), this approach is not exhaustive.
The analysis presented in Sects. 4.1 and 4.2 enable to model the fault at the Instruction Set Architecture (ISA) level. In other words, we can use this model to explain how the program execution is affected by our faults. With this knowledge it is possible to build some software countermeasures. But, as explained in Sect. 1.1, software countermeasures may become irrelevant because the faulted MAB is not clearly identified.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Linux Device Driver Development Cookbook by Rodolfo Giometti(3957)
Embedded Programming with Modern C++ Cookbook by Igor Viarheichyk(3785)
Implementing Cellular IoT Solutions for Digital Transformation by Dennis McCain(3704)
Embedded Linux Development Using Yocto Project - Third Edition by Otavio Salvador & Daiane Angolini(3553)
TinyML Cookbook by Gian Marco Iodice(3471)
Simplifying 3D Printing with OpenSCAD by Colin Dow(2861)
TinyML Cookbook by Gian Marco Iodice & Ronan Naughton(2623)
Fusion 360 for Makers by Lydia Sloan Cline(2231)
Networking A Beginner's Guide by Bruce Hallberg(2228)
Hands-On Linux for Architects by Denis Salamanca(2073)
But How Do It Know? by J. Clark Scott(2039)
Computers For Seniors For Dummies by Nancy C. Muir(2023)
Raspberry Pi and MQTT Essentials by Dhairya Parikh(1980)
Arduino Project Handbook, Volume 2: 25 Simple Electronics Projects for Beginners by Geddes Mark(1963)
9781803246888-ENHANCING DEEP LEARNING WITH BAYESIAN INFERENCE by Unknown(1918)
Hack and HHVM by Owen Yamauchi(1904)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1878)
MicroPython Projects by Jacob Beningo(1768)
Hands-On Internet of Things with MQTT by Tim Pulver(1730)
