NOP-Oriented Programming: Should we Care? - Université de Rennes Accéder directement au contenu
Communication Dans Un Congrès Année : 2020

NOP-Oriented Programming: Should we Care?

Résumé

Many fault injection techniques have been proposed in the recent years to attack computing systems, as well as the corresponding countermeasures. Most of published attacks are limited to one or a few faults. We provide a theoretical analysis of instruction skip attacks to show how an attacker can modify an application behavior at run-time when thousands of instruction skips are possible. Our main result is that instruction skip is Turing-complete under our theoretical model while requiring the presence of only common instructions in the binary. As a consequence, we show that current software-based countermeasures are fragile. In addition, we release a modification of gem5 that implements a classical instruction skip fault model that we used for our experiments. We believe this kind of simulation tools are useful to help the community explore attacks and hardware and software countermeasures.
Fichier principal
Vignette du fichier
silm_workshop_2020.pdf (226.04 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02912301 , version 1 (05-08-2020)

Identifiants

Citer

Pierre-Yves Péneau, Ludovic Claudepierre, Damien Hardy, Erven Rohou. NOP-Oriented Programming: Should we Care?. Sécurité des Interfaces Logiciel/Matériel, Sep 2020, Genoa (virtual), Italy. ⟨10.1109/EuroSPW51379.2020.00100⟩. ⟨hal-02912301⟩
211 Consultations
574 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More