Visible to the public MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms

TitleMiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms
Publication TypeConference Paper
Year of Publication2020
AuthorsSilitonga, A., Gassoumi, H., Becker, J.
Conference Name2020 IEEE 14th International Conference on Anti-counterfeiting, Security, and Identification (ASID)
Date PublishedNov. 2020
ISBN Number978-1-7281-6879-1
Keywordsadapted words addition, all-programmable system-on-chip, AP SoC attacker, AP SoC victim, buffer overflow, Buffer overflow attack, command injection attacks, command-injection, command-injection-based attack, composability, Computer crime, cryptography, dynamic reconfiguration, field programmable gate arrays, FPGA dynamic configuration, Intellectual Property cores, Internet, Internet protocol, internetworked all programmable system-on-chip platforms, IP, Metrics, microarchitectural attack, microarchitecture, microcomputers, microprocessor chips, MiteS, Multiple Encryption, networked AP SoC platforms, PCS, personal computers, preventive countermeasure, Programming, Protocols, pubcrawl, resilience, Resiliency, return oriented programming, return-oriented programming, return-oriented programming attack, software-based microarchitectural attacks, stack protection, system-on-chip

The impact of microarchitectural attacks in Personal Computers (PCs) can be further adapted to and observed in internetworked All Programmable System-on-Chip (AP SoC) platforms. This effort involves the access control or execution of Intellectual Property cores in the FPGA of an AP SoC Victim internetworked with an AP SoC Attacker via Internet Protocol (IP). Three conceptions of attacks were implemented: buffer overflow attack at the stack, return-oriented programming attack, and command-injection-based attack for dynamic reconfiguration in the FPGA. Indeed, a specific preventive countermeasure for each attack is proposed. The functionality of the countermeasures mainly comprises adapted words addition (stack protection) for the first and second attacks and multiple encryption for the third attack. In conclusion, the recommended countermeasures are realizable to counteract the implemented attacks.

Citation Keysilitonga_mites_2020