TY - JOUR
T1 - Stealthy Information Leakage through Peripheral Exploitation in Modern Embedded Systems
AU - Tychalas, Dimitrios
AU - Keliris, Anastasis
AU - Maniatakos, Michail
N1 - Funding Information:
Manuscript received January 24, 2020; revised April 12, 2020; accepted May 1, 2020. Date of publication May 12, 2020; date of current version June 5, 2020. This work was supported in part by the U.S. Office of Naval Research under Award N00014-15 1-2182, and in part by the NYU Abu Dhabi Global Ph.D. Fellowship Program. (Corresponding author: Dimitrios Tychalas.) Dimitrios Tychalas and Anastasis Keliris are with the Department of Electrical and Computer Engineering, NYU Tandon School of Engineering, Brooklyn, NY, 11201 USA (e-mail: dimitris.tychalas@nyu.edu).
Funding Information:
This work was supported in part by the U.S. Office of Naval Research under Award N00014-15 1-2182, and in part by the NYU Abu Dhabi Global Ph.D. Fellowship Program. (Corresponding author: Dimitrios Tychalas.)
Publisher Copyright:
© 2001-2011 IEEE.
PY - 2020/6
Y1 - 2020/6
N2 - Embedded systems are being aggressively integrated in every aspect of modern life, with uses ranging from personal devices to devices deployed in critical systems, such as autonomous vehicles, aircrafts, and industrial control systems. Embedded systems handle sensitive information, which can be potentially exposed leveraging their poor security posture. In this paper, we present a novel attack vector that automates stealthy information leakage from modern embedded systems. Specifically, we leverage the Device Tree, a data structure that describes the hardware profile of a system, to extract detailed information about the target system. Utilizing this information, we introduce a stealthy attack that attempts to bridge the air-gap by transferring data from memory directly to analog peripherals. The attack resides solely in the peripherals, completely transparent to the main CPU, by judiciously short-circuiting specific components. We implement this attack on a commercial Programmable Logic Controller (PLC), leaking information over the available LEDs. We evaluate the presented attack vector in terms of stealthiness, and we demonstrate no observable overhead on both CPU performance and DMA transfer speed. Furthermore, we propose a generalized defense scheme for peripheral exploitation attacks by establishing a hardware root of trust through JTAG debugging. Our methodology keeps track of peripheral traffic through JTAG-enabled monitoring, alerts the system for possible malicious behavior and handles the threat removal. We test our defense in terms of imposed performance overhead and overall potency, achieving solid detection of the underlying attack at a low performance cost.
AB - Embedded systems are being aggressively integrated in every aspect of modern life, with uses ranging from personal devices to devices deployed in critical systems, such as autonomous vehicles, aircrafts, and industrial control systems. Embedded systems handle sensitive information, which can be potentially exposed leveraging their poor security posture. In this paper, we present a novel attack vector that automates stealthy information leakage from modern embedded systems. Specifically, we leverage the Device Tree, a data structure that describes the hardware profile of a system, to extract detailed information about the target system. Utilizing this information, we introduce a stealthy attack that attempts to bridge the air-gap by transferring data from memory directly to analog peripherals. The attack resides solely in the peripherals, completely transparent to the main CPU, by judiciously short-circuiting specific components. We implement this attack on a commercial Programmable Logic Controller (PLC), leaking information over the available LEDs. We evaluate the presented attack vector in terms of stealthiness, and we demonstrate no observable overhead on both CPU performance and DMA transfer speed. Furthermore, we propose a generalized defense scheme for peripheral exploitation attacks by establishing a hardware root of trust through JTAG debugging. Our methodology keeps track of peripheral traffic through JTAG-enabled monitoring, alerts the system for possible malicious behavior and handles the threat removal. We test our defense in terms of imposed performance overhead and overall potency, achieving solid detection of the underlying attack at a low performance cost.
KW - Embedded systems security
KW - JTAG
KW - device tree
KW - direct memory access
UR - http://www.scopus.com/inward/record.url?scp=85087078407&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85087078407&partnerID=8YFLogxK
U2 - 10.1109/TDMR.2020.2994016
DO - 10.1109/TDMR.2020.2994016
M3 - Article
AN - SCOPUS:85087078407
SN - 1530-4388
VL - 20
SP - 308
EP - 318
JO - IEEE Transactions on Device and Materials Reliability
JF - IEEE Transactions on Device and Materials Reliability
IS - 2
M1 - 9091580
ER -