论文标题

emfault它自己:为桌面和服务器硬件构建可复制的EMFI设置

EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware

论文作者

Kühnapfel, Niclas, Buhren, Robert, Jacob, Hans Niklas, Krachenfels, Thilo, Werling, Christian, Seifert, Jean-Pierre

论文摘要

EMFI由于能够精确考虑定时和位置注入故障的能力,已成为一种流行的断层注入(FI)技术。最近,显示不同包装中的ARM,RISC-V甚至X86处理单元都被证明容易受到电磁断层注射(EMFI)攻击的攻击。但是,过去的出版物缺乏对整个攻击设置的详细描述,阻碍了研究人员和公司轻松复制其设备上的攻击。在这项工作中,我们首先展示了如何构建具有高扫描分辨率和良好重复性的自动EMFI设置,该设置足够大,可以攻击现代台式机和服务器CPU。我们从结构上列出了有关机械,硬件和软件的所有详细信息以及本文。其次,我们使用我们的设置来攻击现代AMD系统(SOCS)(AMD Secure处理器(AMD-SP))中的深层嵌入式安全处理器。使用先前发布的代码执行利用,我们在AMD-SP上运行两个自定义有效载荷,以不同程度利用SOC。然后,我们可以在SOC照片上可视化这些故障位置,从而使我们能够对SOC的组件受到攻击。最后,我们表明,第一个执行的固件零件之一的签名验证过程容易受到EMFI攻击的影响,从而破坏了整个SOC的安全体系结构。据我们所知,这是对AMD桌面CPU的首次报道的EMFI攻击。

EMFI has become a popular fault injection (FI) technique due to its ability to inject faults precisely considering timing and location. Recently, ARM, RISC-V, and even x86 processing units in different packages were shown to be vulnerable to electromagnetic fault injection (EMFI) attacks. However, past publications lack a detailed description of the entire attack setup, hindering researchers and companies from easily replicating the presented attacks on their devices. In this work, we first show how to build an automated EMFI setup with high scanning resolution and good repeatability that is large enough to attack modern desktop and server CPUs. We structurally lay out all details on mechanics, hardware, and software along with this paper. Second, we use our setup to attack a deeply embedded security co-processor in modern AMD systems on a chip (SoCs), the AMD Secure Processor (AMD-SP). Using a previously published code execution exploit, we run two custom payloads on the AMD-SP that utilize the SoC to different degrees. We then visualize these fault locations on SoC photographs allowing us to reason about the SoC's components under attack. Finally, we show that the signature verification process of one of the first executed firmware parts is susceptible to EMFI attacks, undermining the security architecture of the entire SoC. To the best of our knowledge, this is the first reported EMFI attack against an AMD desktop CPU.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源