Towards attacks on restricted memory areas through co-processors in embedded multi-OS environments via malicious firmware injection

  • Authors:
  • Pierre Schnarz;Joachim Wietzke;Ingo Stengel

  • Affiliations:
  • University of Applied Sciences, Darmstadt, Germany;University of Applied Sciences, Darmstadt, Germany;Centre for Security, Communications and Network Research, Plymouth, United Kingdom

  • Venue:
  • Proceedings of the First Workshop on Cryptography and Security in Computing Systems
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

Multi-operating systems have been introduced to manage the manifold requirements of embedded systems. Especially in safety critical environments like the automotive domain the system's security must be guaranteed. Despite the state-of-the-art virtualization mechanisms, the idea of asymmetric-multi-processing can be used to split a system's hardware resources, which makes the virtualization of hardware obsolete. However, this special technique to implement a multi-operating system might add special demands to security objectives like isolation. In this paper an attack vector is shown, which utilizes a co-processor to break through the isolation of an operating system domain. Using a multi-operating system environment, we inject a malicious firmware into the co-processor in order to circumvent isolation mechanisms on behalf of an attacking operating system. Our attack vector demonstrates weaknesses in CPU centric isolation mechanisms, which will be further presented in the remainder of the document.