"HackerThey are more and more willing to devote more time and energy to attacking various devices because they gain more and more benefits through attack. "At present, the Internet of Things is under attack on three levels of networks, devices and chips, and attacks can be broadly divided into cyber attacks (stealing sensitive data), software attacks (embedded malware), and hardware attacks (Synopsys)," said Rich Collins, a market manager for new think technology. There are three types of non-intrusive attacks using debug or side channel mode.
in the case of a vicious attack on a SOC chip, the attacks include IP theft (access or physical analysis of the memory without authorization), fault injection (intentional injection of errors in the system, and discovery of vulnerabilities in the system), side channel attacks ( Attacks on information such as time consumption, power consumption or electromagnetic radiation during the operation of an encrypted electronic device, malicious attacks by malicious software or listeners, tampering with related faults, physical/hardware attacks on the system, peripheral attacks (hijacking of USB or wireless connections, loading of malware, access), etc.
according to our observation, because the effectiveness of side channel attack is much higher than that of cipher analysis, the key information of many systems can be obtained by Time series analysis, which is defined by hackers as one of the highest rate of return. This poses a great security risk for low-power embedded applications such as smart watches, NFC payments, and embedded SIM, and is becoming the latest hacker attack. "said Rich Collins.
It is perfectly understandable that IoT devices need a higher level of security because they are vulnerable to these attacks from the bottom. But on the other hand, constrained by the power and area constraints, to increase the security function, SOC chip will be the corresponding increase in area and power consumption, whether there is "fish and bear Paw, both" solution?
New technology recently announced the launch of the DesignWare ARC SEM110 and sem120d security processor for this to make a useful attempt. Data show that the new arc SEM processor using Synopsys Secureshield technology is based on the extensible 32-bit ARCV2 instruction set architecture (ISA), the DSP instructions added in sem120d and the unified Mul/mac Unit, Supports applications that require enhanced security and real-time processing, such as sensor processing and speech recognition for healthcare and IoT devices.
state-of-the-art security features such as side-channel resilience with unified command timing and timing/energy randomization can confuse safe operation and prevent potential hackers from knowing the operation; with inline instruction/ data encryption Anti-tamper pipelining with address scrambling and data integrity checks to protect against system attacks and IP theft; Integrated monitor timers detect system failures including tampering, allowing designers to prevent systems from being subjected to software, hardware, and side channel attacks, and support as a trusted execution Environment (TEE) Part of the individual security and non-security features.
The Synopsys Embarc Open software platform provides software developers with online access to a complete set of free open source software, including secure transport protocols. The platform includes a new Secureshield runtime library that runs in a specific context and manages container partitioning and isolation in a trusted execution environment.
like all arc processors, the ARC SEM processor has an ecosystem of reliable software and hardware development tools that support it, including: the Metaware Development Kit for efficient code for deep embedded applications, the ARC nsim Fast instruction set Simulator to support initial software development, Arc Xcam for software optimization and system validation with 100%-cycle accurate simulations. In addition, support for Synopsys's haps physical prototyping system enables early software development, hardware/software integration, and system validation based on ARC SEM processor design.
The above is the specific content of "what hackers think is the highest rate of return attack" and want to know about hacking andHacker Defenseinformation, please pay more attention to I spring and autumn cyber security College.
What hackers think is the highest rate of attack method