• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Taking a Look into Execute-Only Memory
 
  • Details
  • Full
Options
2019
Conference Paper
Title

Taking a Look into Execute-Only Memory

Abstract
The development process of microcontroller firmware often involves multiple parties. In such a scenario, the Intellectual Property (IP) is not protected against adversarial developers which have unrestricted access to the firmware binary. For this reason, microcontroller manufacturers integrate eXecute-Only Memory (XOM) which shall prevent an unauthorized read-out of third-party firmware during development. The concept allows execution of code but disallows any read access to it. Our security analysis shows that this concept is insufficient for firmware protection due to the use of shared resources such as the CPU and SRAM. We present a method to infer instructions from observed state transitions in shared hardware. We demonstrate our method via an automatic recovery of protected firmware. We successfully performed experiments on devices from different manufacturers to confirm the practicability of our attack. Our research also reveals implementation flaws in some of the analyzed devices which enables an adversary to bypass the read-out restrictions. Altogether, the paper shows the insufficient security of the XOM concept as well as several implementations.
Author(s)
Schink, Marc  
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Obermaier, Johannes
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Mainwork
WOOT 2019, 13th USENIX Workshop on Offensive Technologies. Online resource  
Conference
Workshop on Offensive Technologies (WOOT) 2019  
File(s)
Download (221.82 KB)
Rights
Use according to copyright law
DOI
10.24406/publica-fhg-409236
Language
English
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Keyword(s)
  • hardware security

  • xom

  • cortex-m

  • firmware

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024