Towards Malicious Exploitation of Energy Management Mechanisms - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2020

Towards Malicious Exploitation of Energy Management Mechanisms

Résumé

Architectures are becoming more and more complex to keep up with the increase of algorithmic complexity. To fully exploit those architectures, dynamic resources managers are required. The goal of dynamic managers is either to optimize the resource usage (e.g. cores, memory) or to reduce energy consumption under performances constraints. However, performance optimization being their main goal, they are not developed to be secure and present vulnerabilities. Recently, it was proven that energy managers can be exploited to cause faults within a processor and it can be used to steal information from a user device. However, this exploitation is not often possible in current commercial devices. In this work, we show current security vulnerabilities through another type of malicious usage of energy management, experimentation shows that it is possible to remotely lock out a device, denying access to all services and data, requiring for example the user to pay a ransom to unlock it. The main target of this exploit are embedded systems and we demonstrate this work by its implementation on two different commercial ARM based devices.

Domaines

Electronique Autre
Fichier non déposé

Dates et versions

hal-02376005 , version 1 (22-11-2019)

Identifiants

  • HAL Id : hal-02376005 , version 1

Citer

Safouane Noubir, Maria Mendez Real, Sébastien Pillement. Towards Malicious Exploitation of Energy Management Mechanisms. Design, Automation and Test in Europe Conference, Mar 2020, Grenoble, France. paper #257. ⟨hal-02376005⟩
115 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More