Nytro Posted December 22, 2011 Report Posted December 22, 2011 Hardware Involved Software AttacksJeff Forristal jeff.forristal_@_intel.comAbstractComputer security vulnerabilities involving hardware are under-represented within the security industry. With a growing number of attackers, malware, and researchers moving beyond pure software attack scenarios and into scenarios incorporating a hardware element, it is important to start laying a foundation on how to understand, characterize, and defend against these types of hybrid attacks. This paper introduces and details a starting taxonomy of security attacks called hardware involved software attacks, in an effort to further security community awareness of hardware security and its role in upholding the security of the PC platform.Table of ContentsPreface ......................................................................................................................................................... 3PC System Stack: Setting the Stage ............................................................................................................... 3Focus on the Hardware Layer ................................................................................................................... 5Forced Migration Down the Stack ............................................................................................................ 6Hardware Background ................................................................................................................................. 7How Hardware Facilitates Security Attacks .............................................................................................. 8Obtaining Hardware Access ...................................................................................................................... 8Taxonomy of Hardware Involved Software Attacks ..................................................................................... 9Inappropriate General Access to Hardware............................................................................................ 10Unexpected Consequences of Specific Hardware Function ................................................................... 11Hardware Reflected Injection ................................................................................................................. 11Interference with Hardware Privilege Access Enforcement ................................................................... 13Access By a Parallel Executing Entity ...................................................................................................... 13External Control of a Hardware Device .................................................................................................. 14Incorrect Hardware Use .......................................................................................................................... 14Where to Go From Here ............................................................................................................................. 15Appendix A – Publicized Hardware Vulnerabilities ..................................................................................... 15CVE List of Hardware Involved Software Vulnerabilities ........................................................................ 16Download:http://www.forristal.com/material/Forristal_Hardware_Involved_Software_Attacks.pdf Quote