YoVDO

On Code Execution Tracking via Power Side-Channel

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Cybersecurity Courses Embedded Systems Courses Hidden Markov Models Courses Side Channel Attacks Courses Control-Flow Integrity Courses

Course Description

Overview

Explore a conference talk from CCS 2016 focusing on code execution tracking through power side-channel analysis. Delve into the authors' research on microcontroller unit (MCU) security, examining key extraction attacks and control flow integrity. Learn about the application of Hidden Markov Models for tracking code execution, including state definition, Viterbi algorithm implementation, and emission distribution design. Discover the evaluation setup, abnormal execution tracking techniques, and potential future developments in this critical area of embedded system security.

Syllabus

Intro
Microcontroller Unit (MCU) Core of embedded system
Scenario 1: Key Extraction Attack
Scenario 2: Control Flow Integrity (CFI)
Code Execution Tracking
Execution tracking via Power Side-channel
Problem Formulation . Given code & power trace of MCU
Hidden Markov Model (HMM)
Overall Framework
Naïve State Definition
Basic Block as State
Unequal-length States (Cont'd) 2. Viterbl : recover the most probable state sequence
Complexity Analysis
Emission Distribution Design
Observation Symbol Design
Signal Extraction
Calibrated likelihood 1. Sample cach instruction's average likelihood during normal execution
Evaluation Setup
Abnormal Execution Tracking
Conclusion & Future Works


Taught by

ACM CCS

Related Courses

Enforcing Unique Code Target Property for Control-Flow Integrity
Association for Computing Machinery (ACM) via YouTube
Current Status of RISC-V Security Mechanisms - Nick Kossifidis, FORTH
TheIACR via YouTube
Two-Faces of WASM Security
Security BSides San Francisco via YouTube
Taking Kernel Hardening to the Next Level
Black Hat via YouTube
The Power of Data-Oriented Attacks - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques
Black Hat via YouTube