SlideShare a Scribd company logo
Designing and implementing
malicious processors
Sam King, Joe Tucek, Anthony Cozzie, Chris
Grier, Weihang Jiang, Yuanyuan Zhou
Presented by: Nebiyu Awoke
Outlines
2
o Introduction
o System Design
o Hardware Design
o Implementation
o Evaluation
o Defending Strategy
o Conclusions
o Discussion
3
Introduction
https://i1.wp.com/semiengineering.com/wp
content/uploads/Synopsys_silicon-lifecycle-fig1.jpg?ssl=1
 Commercial-off-the-shelf (COTS)
 Insecure IC supply chain
- design, manufacturing and testing a
diverse set of countries
 Why Hardware attack?
- lower level of control
4
Cont..
IBM “trojan circuit”
- To steal encryption keys
- 406 additional gates
Limitations
- Operates on hardware-level abstractions directly.
- Ignore higher-level abstractions and system-level aspects
- Defensive strategy,
- Ignored existing counter-strategies an attacker may employ
- Hard-coded attack;
- The malicious circuit is useful for only this one specific purpose.
5
Cont ..
What’s new?
 Design and implementation of general purpose hardware to
support software based attacks.
6
System Design
 Circuit design space:
- Memory access mechanism
- Shadow mode mechanism
 Potential attacks:
- Privilege escalation attack
- Login backdoor
- Stealing passwords
7
Cont..
 Memory access mechanism: bypass MMU
- Privilege escalation attack
- Gives a root without checking credentials or creating log entries
 Shadow mode mechanism:
- Login backdoor
- Lets an attacker log in as root without supplying a password,
- Stealing passwords
8
Hardware Design
 Tradeoff and assumptions
- Timing perturbations:
- The performance impact of the modification
- Visibility of the attack:
- Weather or not sign of the attack appears on the data or address bus
- Flexibility:
- Can it support various software payloads?
9
Memory Access
Lauren B. & Shuang Q. https://www.eecs.umich.edu/courses/eecs573
provides hardware support for
unprivileged malicious software
by allowing access to privileged
memory regions..
10
Cont..
Visibility: visible
Flexibility: flexible
Timing Perturbations: have no effect
Lauren B. & Shuang Q. https://www.eecs.umich.edu/courses/eecs573
11
Shadow Mode
 Have full processor privileges and are invisible to software.
 Reserve instruction cache lines and data cache lines for the attack
- hide attack from hardware outside of IMP
 Two bootstrap mechanisms
- a small section of bootstrap code that initializes the attack or
- a predefined trigger, which initiates malicious FW
 The exact mechanism used to bootstrap attacks depends on the goals of the
attacker and the IMP architect.
 Debugging hardware: support transitions into shadow mode
12
Cont..
Hardware differences when shadow mode is active
Visibility: not visible as long as accessing
main memory
Flexibility: flexible
Timing Perturbations: will have a
performance effect
13
Malicious Services
 Privilege escalation
- Turn off protection to privileged
memory regions.
- Escalates the privileges of a user
process to root privilege level
Lauren B. & Shuang Q. https://www.eecs.umich.edu/courses/eecs573
14
Cont..
 Login backdoor  Stealing passwords
- Interposes on the write library call,
searching for the string “Password:”
- On the following read call it interposes
to record potential passwords.
- Leak passwords
- Uses system calls to access
the network interface.
- Overwrite existing network frames
with our own packets.
15
Implementation
 Development board: FPGA
 Processor: Leon3 implements SPARC v8 IS
 Modify the design at the VHDL level
 OS: Linux
 Memory access mechanism modify the data cache and the MMU
 Shadow mode mechanism modify instruction and data caches
 Run at 40 MHz, which is the recommended clock speed
16
Evaluation
 Circuit-level perturbations
The circuit-level impact of IMPs compared to a
baseline (unmodified) Leon3 processor.
0.05% and 0.08% increase in logic
add 68 lines of code for MAM &
117 lines of code for SM
 Timing perturbation
- CPU bound SPEC benchmarks: bzip2, gcc, parse
, and twolf
- I/O bound benchmark: wget
1.32% overhead 1.34% overhead 13.0% overhead
17
Defending Strategy
 Analog side effects
- Using power analysis: however, power analysis began as an attack
technique .
 Digital perturbations
- IC testing: waiting for a specific triggering input will pass testing
- Reverse engineering: time-consuming, expensive, destructive
- Fault-tolerance techniques: Hw redundancy make it expensive because
of cost, power consumption, and board real estate.
 The best defense is most likely a combination approach.
18
Conclusions
- Hardware Trojan (HT), has emerged as an important
research topic in recent years.
- IC supply chain is large and vulnerable
- Designed two general purpose mechanisms: MAM & SM
- Implement attacks: privilege escalation, back-door logins and
steal passwords
- Hw modification of high level flexibility with low detectability
- Defending approaches are to inefficient to detect
Discussions
◉ Is it possible to design ICs with self protection awareness?
◉ Are these attacks able to escape all the existing counter strategies?
◉ How can assure a high level defending strategy like on-chip
monitoring during run time?
◉ Is IMP feasible in terms of performance, power, area and security
costs?
◉ What about other attacks like disabling or destroying a system at
some future time?
19

More Related Content

PPTX
Reconfigurable trust forembeddedcomputingplatforms
PDF
Cyber_Attack_Forecasting_Jones_2015
PDF
MIT Bitcoin Expo 2018 - Hardware Wallets Security
PDF
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
PPTX
Meltdown and Spectre
PPTX
PDF
Security in Embedded systems
PDF
Exploiting Modern Microarchitectures: Meltdown, Spectre, and other Attacks
Reconfigurable trust forembeddedcomputingplatforms
Cyber_Attack_Forecasting_Jones_2015
MIT Bitcoin Expo 2018 - Hardware Wallets Security
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Meltdown and Spectre
Security in Embedded systems
Exploiting Modern Microarchitectures: Meltdown, Spectre, and other Attacks

What's hot (18)

PPTX
Jonny doin safe io t- lt_spice failsafe
PPTX
Osd diksha presentation
PPTX
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
PDF
Careful Packing
PPTX
Defense
PDF
Mission Critical Security in a Post-Stuxnet World Part 2
PDF
DSDConference07
PPTX
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
PDF
Meltdown & Spectre attacks
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Rre a-game-theoretic-intrusion-r...
PPTX
Thesis presentation
PDF
Breaking hardware enforced security with hypervisors
PDF
Cybersecurity Assessment of Communication-Based Train Control systems
PDF
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
PDF
System-level Threats: Dangerous Assumptions in modern Product Security
PPTX
Security for io t apr 29th mentor embedded hangout
PPTX
Infrastructure Attacks - The Next generation, ESET LLC
PDF
Chap 4 lesson02emsysnewinterruptbasedi_os
Jonny doin safe io t- lt_spice failsafe
Osd diksha presentation
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
Careful Packing
Defense
Mission Critical Security in a Post-Stuxnet World Part 2
DSDConference07
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
Meltdown & Spectre attacks
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Rre a-game-theoretic-intrusion-r...
Thesis presentation
Breaking hardware enforced security with hypervisors
Cybersecurity Assessment of Communication-Based Train Control systems
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
System-level Threats: Dangerous Assumptions in modern Product Security
Security for io t apr 29th mentor embedded hangout
Infrastructure Attacks - The Next generation, ESET LLC
Chap 4 lesson02emsysnewinterruptbasedi_os
Ad

Similar to Designing and implementing malicious processors (20)

PPT
Sneak Peek into the Future with Prof. Indranil Sengupta, IIT Kharagpur
PDF
Exploring Hardware Security
PDF
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
PPT
Embabded system security for feuture .ppt
PDF
HARDWARE ATTACK MITIGATION TECHNIQUES ANALYSIS
PDF
Hardware Attack Mitigation Techniques AnalysisFull Text
PDF
HARDWARE ATTACK MITIGATION TECHNIQUES ANALYSIS
PPTX
Pentesting embedded
PDF
Acpi and smi handlers some limits to trusted computing
PDF
CONFidence 2018: Who and why should fear hardware trojans? (Adam Kostrzewa)
PPTX
A2: Analog Malicious Hardware
PDF
Tower defense for hackers: Layered (in-)security for microcontrollers
PPTX
Securing embedded systems
PDF
Micro-Architectural Attacks on Cyber-Physical Systems
PDF
2019 FRSecure CISSP Mentor Program: Class Four
PDF
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
PPTX
CAQA5e_ch1 (3).pptx
PDF
Austin c-c++-meetup-feb2018-spectre
PDF
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Sneak Peek into the Future with Prof. Indranil Sengupta, IIT Kharagpur
Exploring Hardware Security
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Embabded system security for feuture .ppt
HARDWARE ATTACK MITIGATION TECHNIQUES ANALYSIS
Hardware Attack Mitigation Techniques AnalysisFull Text
HARDWARE ATTACK MITIGATION TECHNIQUES ANALYSIS
Pentesting embedded
Acpi and smi handlers some limits to trusted computing
CONFidence 2018: Who and why should fear hardware trojans? (Adam Kostrzewa)
A2: Analog Malicious Hardware
Tower defense for hackers: Layered (in-)security for microcontrollers
Securing embedded systems
Micro-Architectural Attacks on Cyber-Physical Systems
2019 FRSecure CISSP Mentor Program: Class Four
44CON 2014 - Stupid PCIe Tricks, Joe Fitzpatrick
CAQA5e_ch1 (3).pptx
Austin c-c++-meetup-feb2018-spectre
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Ad

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
master seminar digital applications in india
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Structure & Organelles in detailed.
Microbial disease of the cardiovascular and lymphatic systems
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A systematic review of self-coping strategies used by university students to ...
human mycosis Human fungal infections are called human mycosis..pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Chinmaya Tiranga quiz Grand Finale.pdf
VCE English Exam - Section C Student Revision Booklet
Orientation - ARALprogram of Deped to the Parents.pptx
Weekly quiz Compilation Jan -July 25.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Complications of Minimal Access Surgery at WLH
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
master seminar digital applications in india
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Designing and implementing malicious processors

  • 1. Designing and implementing malicious processors Sam King, Joe Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou Presented by: Nebiyu Awoke
  • 2. Outlines 2 o Introduction o System Design o Hardware Design o Implementation o Evaluation o Defending Strategy o Conclusions o Discussion
  • 3. 3 Introduction https://i1.wp.com/semiengineering.com/wp content/uploads/Synopsys_silicon-lifecycle-fig1.jpg?ssl=1  Commercial-off-the-shelf (COTS)  Insecure IC supply chain - design, manufacturing and testing a diverse set of countries  Why Hardware attack? - lower level of control
  • 4. 4 Cont.. IBM “trojan circuit” - To steal encryption keys - 406 additional gates Limitations - Operates on hardware-level abstractions directly. - Ignore higher-level abstractions and system-level aspects - Defensive strategy, - Ignored existing counter-strategies an attacker may employ - Hard-coded attack; - The malicious circuit is useful for only this one specific purpose.
  • 5. 5 Cont .. What’s new?  Design and implementation of general purpose hardware to support software based attacks.
  • 6. 6 System Design  Circuit design space: - Memory access mechanism - Shadow mode mechanism  Potential attacks: - Privilege escalation attack - Login backdoor - Stealing passwords
  • 7. 7 Cont..  Memory access mechanism: bypass MMU - Privilege escalation attack - Gives a root without checking credentials or creating log entries  Shadow mode mechanism: - Login backdoor - Lets an attacker log in as root without supplying a password, - Stealing passwords
  • 8. 8 Hardware Design  Tradeoff and assumptions - Timing perturbations: - The performance impact of the modification - Visibility of the attack: - Weather or not sign of the attack appears on the data or address bus - Flexibility: - Can it support various software payloads?
  • 9. 9 Memory Access Lauren B. & Shuang Q. https://www.eecs.umich.edu/courses/eecs573 provides hardware support for unprivileged malicious software by allowing access to privileged memory regions..
  • 10. 10 Cont.. Visibility: visible Flexibility: flexible Timing Perturbations: have no effect Lauren B. & Shuang Q. https://www.eecs.umich.edu/courses/eecs573
  • 11. 11 Shadow Mode  Have full processor privileges and are invisible to software.  Reserve instruction cache lines and data cache lines for the attack - hide attack from hardware outside of IMP  Two bootstrap mechanisms - a small section of bootstrap code that initializes the attack or - a predefined trigger, which initiates malicious FW  The exact mechanism used to bootstrap attacks depends on the goals of the attacker and the IMP architect.  Debugging hardware: support transitions into shadow mode
  • 12. 12 Cont.. Hardware differences when shadow mode is active Visibility: not visible as long as accessing main memory Flexibility: flexible Timing Perturbations: will have a performance effect
  • 13. 13 Malicious Services  Privilege escalation - Turn off protection to privileged memory regions. - Escalates the privileges of a user process to root privilege level Lauren B. & Shuang Q. https://www.eecs.umich.edu/courses/eecs573
  • 14. 14 Cont..  Login backdoor  Stealing passwords - Interposes on the write library call, searching for the string “Password:” - On the following read call it interposes to record potential passwords. - Leak passwords - Uses system calls to access the network interface. - Overwrite existing network frames with our own packets.
  • 15. 15 Implementation  Development board: FPGA  Processor: Leon3 implements SPARC v8 IS  Modify the design at the VHDL level  OS: Linux  Memory access mechanism modify the data cache and the MMU  Shadow mode mechanism modify instruction and data caches  Run at 40 MHz, which is the recommended clock speed
  • 16. 16 Evaluation  Circuit-level perturbations The circuit-level impact of IMPs compared to a baseline (unmodified) Leon3 processor. 0.05% and 0.08% increase in logic add 68 lines of code for MAM & 117 lines of code for SM  Timing perturbation - CPU bound SPEC benchmarks: bzip2, gcc, parse , and twolf - I/O bound benchmark: wget 1.32% overhead 1.34% overhead 13.0% overhead
  • 17. 17 Defending Strategy  Analog side effects - Using power analysis: however, power analysis began as an attack technique .  Digital perturbations - IC testing: waiting for a specific triggering input will pass testing - Reverse engineering: time-consuming, expensive, destructive - Fault-tolerance techniques: Hw redundancy make it expensive because of cost, power consumption, and board real estate.  The best defense is most likely a combination approach.
  • 18. 18 Conclusions - Hardware Trojan (HT), has emerged as an important research topic in recent years. - IC supply chain is large and vulnerable - Designed two general purpose mechanisms: MAM & SM - Implement attacks: privilege escalation, back-door logins and steal passwords - Hw modification of high level flexibility with low detectability - Defending approaches are to inefficient to detect
  • 19. Discussions ◉ Is it possible to design ICs with self protection awareness? ◉ Are these attacks able to escape all the existing counter strategies? ◉ How can assure a high level defending strategy like on-chip monitoring during run time? ◉ Is IMP feasible in terms of performance, power, area and security costs? ◉ What about other attacks like disabling or destroying a system at some future time? 19