Towards Dynamic Execution Environment for System Security Protection against Hardware Flaws

Kenneth Schmitz, Oliver Keszöcze, Jurij Schmidt, Daniel Große, Rolf Drechsler

In: IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE Computer Society Annual Symposium on VLSI (ISVLSI-2018) July 9-11 Hong Kong China 2018.


Attacks exploiting security flaws in software are very common. They are typically addressed during the ongoing software development process or by providing software patches. Attacks making use of hardware related flaws via malicious software recently gained popularity. Prominent examples are erratabased, aging-related or, for example, the infamous Rowhammerattack. In this paper, we present an approach to detect softwarebased attacks which exploit hardware flaws. Since the flaws are typically triggered by characteristic instruction sequences, our approach is implemented as a dynamic execution environment for program monitoring at runtime. Several case studies underline the effectiveness and the low overhead of our approach.


German Research Center for Artificial Intelligence
Deutsches Forschungszentrum für Künstliche Intelligenz