Next Article in Journal
Two-Dimensional Electronics and Optoelectronics: Present and Future
Next Article in Special Issue
A Data Compression Hardware Accelerator Enabling Long-Term Biosignal Monitoring Based on Ultra-Low Power IoT Platforms
Previous Article in Journal
The Raspberry Pi: A Technology Disrupter, and the Enabler of Dreams
Previous Article in Special Issue
Real-Time and High-Accuracy Arctangent Computation Using CORDIC and Fast Magnitude Estimation
Article Menu

Export Article

Open AccessArticle
Electronics 2017, 6(3), 52; doi:10.3390/electronics6030052

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

1
Electrical and Computer Engineering Department University of Patras, Rion Campus, Patras 26500, Greece
2
Industrial Systems Institute, Research Center ATHENA, Platani, Patra 26504, Greece
*
Author to whom correspondence should be addressed.
Received: 31 May 2017 / Revised: 29 June 2017 / Accepted: 4 July 2017 / Published: 13 July 2017
(This article belongs to the Special Issue Real-Time Embedded Systems)
View Full-Text   |   Download PDF [223 KB, uploaded 13 July 2017]

Abstract

Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Operational Technology (OT) systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures) capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory). Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS) such systems are designed to provide. View Full-Text
Keywords: embedded system security; microarchitecture attacks; cache attacks; rowhammer attack embedded system security; microarchitecture attacks; cache attacks; rowhammer attack
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Fournaris, A.P.; Pocero Fraile, L.; Koufopavlou, O. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks. Electronics 2017, 6, 52.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Electronics EISSN 2079-9292 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top