The massive trend toward embedded systems introduces new security threats to prevent. Malicious firmware makes it easier to launch cyberattacks against embedded systems. Systems infected with malicious firmware maintain the appearance of normal firmware operation but execute undesirable activities, which is usually a security risk. Traditionally, cybercriminals use malicious firmware to develop possible back-doors for future attacks. Due to the restricted resources of embedded systems, it is difficult to thwart these attacks using the majority of contemporary standard security protocols. In addition, monitoring the firmware operations using existing side channels from outside the processing unit, such as electromagnetic radiation, necessitates a complicated hardware configuration and in-depth technical understanding. In this paper, we propose a physical side channel that is formed by detecting the overall impedance changes induced by the firmware actions of a central processing unit. To demonstrate how this side channel can be exploited for detecting firmware activities, we experimentally validate it using impedance measurements to distinguish between distinct firmware operations with an accuracy of greater than 90%. These findings are the product of classifiers that are trained via machine learning. The implementation of our proposed methodology also leaves room for the use of hardware authentication.
翻译:大量嵌入系统的趋势带来了新的安全威胁。 恶意固态软件使得对嵌入系统发动网络攻击更容易。 受恶意固态软件感染的系统保持正常的固态软件运行的外观,但执行不受欢迎的活动,这通常是一种安全风险。 传统上,网络罪犯使用恶意固态软件开发可能的后门系统,以便将来进行攻击。 由于嵌入系统资源有限,很难利用大多数当代标准安全协议来挫败这些攻击。 此外,利用处理器外的现有侧渠道,例如电磁辐射,对固态软件操作进行监测,这需要复杂的硬件配置和深入的技术理解。 在本文中,我们提出一个物理侧端通道,通过检测中央处理器的固态动作引起的整体阻力变化而形成。为了证明如何利用这一侧端端的软件来探测固态软件活动,我们实验性地验证它使用阻力测量方法来区分各种特定的固态软件操作,精确度大于90%。 这些发现是通过机器学习培训的分级器的产物。 我们提出的方法的实施也留下硬件认证的空间。