A2: Analog Malicious Hardware

User avatar
Clayton
Posts: 10553
Joined: Thu May 07, 2020 2:14 pm

A2: Analog Malicious Hardware

Post by Clayton »

I recently attended a talk by Virginia Tech professor Matthew Hicks. In the talk, he mentioned a paper he contributed to, A2: Analog Malicious Hardware. The paper is about inserting a small analog trigger into digital chips that can be remotely activated through software. The trigger enables some kind of hardware trojan that, for example, permits the currently running computer instructions to operate at kernel privilege level.

The key idea of this attack is to use some kind of non-privileged system event that happens on occasion in normal software, but is never extremely frequent. This event is used to charge a small capacitor inside the trigger. When the capacitor fills to a high enough level, it will read as a logical 1 (or 0, or whatever... it will toggle.)

This image shows the triggering event on top and the capacitor charge in the middle. Once the capacitor charge exceeds the threshold (red line), the hardware exploit is triggered and the malicious software can now take over the system:

Image

During ordinary operation, the triggering event is too rare to ever cause the capacitor to completely fill (the capacitor will naturally lose charge over time due to leakage). But if the attacker can run non-privileged software on the CPU, he can trigger the attack by performing this rare event in a massive burst. The example used in the paper is the divide-by-zero flag but any suitable signal in the CPU could be used instead. The key is that no normal workload would ever saturate the divide-by-zero flag in the way that the malicious user code does. And since it is not privileged code, it is able to run normally, as for example through JavaScript running in a browser tab. Once the capacitor is fully charged, the CPU's privilege logic will be temporarily corrupted (until the capacitor discharges through leakage) and the malicious software is now free to execute instruction bytes that contain kernel-privilege code that would ordinarily cause the software to generate a fault and be terminated. And once the attacker has his toe in the door, he can just perform a full transition to escalated privilege-level and run whatever code he wants from there on out.

The trigger is remarkable because it simultaneously achieves two goals that seem mutually exclusive at first glance: it is both stealthy (hard to detect through testing) and small. And it works.

Lots of lessons in this paper...

:cheers
Jer. 11:18-20. "The Kingdom of God has come upon you." -- Matthew 12:28
User avatar
3D.
Posts: 2584
Joined: Wed Apr 22, 2020 11:22 am

Re: A2: Analog Malicious Hardware

Post by 3D. »

Who would manufacture such a thing?

Would this be something an enemy country would manufacture into the hardware they are selling to us, so as to be able to disable our systems when they wanted to?
User avatar
Clayton
Posts: 10553
Joined: Thu May 07, 2020 2:14 pm

Re: A2: Analog Malicious Hardware

Post by Clayton »

3D. wrote: Tue Dec 14, 2021 2:25 pm Who would manufacture such a thing?

Would this be something an enemy country would manufacture into the hardware they are selling to us, so as to be able to disable our systems when they wanted to?
Exactly.
Jer. 11:18-20. "The Kingdom of God has come upon you." -- Matthew 12:28
User avatar
Atruepatriot
Posts: 12151
Joined: Tue Feb 25, 2020 11:55 am

Re: A2: Analog Malicious Hardware

Post by Atruepatriot »

Cool share man!
“The ultimate test of a moral society is the kind of world it leaves to its children.” ~ Dietrich Bonhoeffer
User avatar
Clayton
Posts: 10553
Joined: Thu May 07, 2020 2:14 pm

Re: A2: Analog Malicious Hardware

Post by Clayton »

It's a brazen attack because the evidence of the attack will be etched permanently into silicon. If it is done in the factory, there will be as many copies of it as there were parts manufactured with that defect. So it's absolutely brazen.
Jer. 11:18-20. "The Kingdom of God has come upon you." -- Matthew 12:28
Post Reply