Overview
Syllabus
Intro
Software security success forces attackers to lower layers
Dynamic Static Analysis
Challenge: construct an attack that is stealthy and small
Two threats, we focus on the stage that restricts the attacker the most
We leverage analog behavior to construct an attack that is stealthy and small
An ideal analog trigger
Challenge: small capacitors charge quickly, large capacitors induce current spikes
Solution: charge sharing
Creating an analog trigger using gated charge sharing
Creating a privilege escalation attack Our analog trigger is attack agnostic
Implanting A2 into an existing chip layout
Taught by
IEEE Symposium on Security and Privacy