Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
57 lines (34 sloc) 4.38 KB

Info about hardware security

"If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle." --- Sun Tzu

If the peripheral device and firmware( e.g: Intel ME) is called "Ring -3", so let's call "Ring -4" refered as hardware level( naming is one of the hardest issue in CS, isn't it;-)). Those knowledge from offensive side will help us to know better where we are and how we react.

Fault injection

Mitigation/Countermeasure

  • The IP register can be modified by software at runtime in arhcitectures like armv7 which can be exploited by some FI methods. The critical mission should avoid to use such hardwares.

  • Software mitigation: Hardening the COREs.

  • Don't make compiler( volatile) become your enemy.

Article/paper

Secure processor, PUF/POK/FET

Hardware trojan

Free/libre open source project

You can’t perform that action at this time.