4. Coupled software and hardware attacks
Today's systems-on-a-chip are increasingly complex. This complexity is leading to the development of new attack paths that combine hardware and software aspects. So a physical attack can open up a vulnerability enabling a software attack, or software code can lead to hardware failure.
4.1 Coupling software and physical attacks
An example of coupled attacks targeting processors is the hardware corruption of a secured boot loader sequence, enabling the execution of malicious code. During a normal secured boot loader sequence, the boot code is loaded (usually in chunks) into the processor's RAM memory. This involves a sequence of instructions to load the data addressed in ROM into an internal register of the processor (load), and then to store the same data at...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Coupled software and hardware attacks
Article included in this offer
"Software technologies and System architectures"
(
227 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!