Abstract:
Within several domains of embedded computing, multi operating systems will be introduced in future. This is motivated by the need of fulfilling widespread requirements. A...View moreMetadata
Abstract:
Within several domains of embedded computing, multi operating systems will be introduced in future. This is motivated by the need of fulfilling widespread requirements. Additionally, safety critical automotive domains add high demands on the security of such systems. Depending on the hardware architecture, it is possible to use several techniques to isolate systems. These are necessary for security reasons. Despite the state-of-the-art virtualization mechanisms, the idea of asymmetric-multiprocessing can be used to split a system's hardware resources, which makes the virtualization of hardware obsolete. However, independent devices like co-processors might add potential security risks. In this paper an attack vector is shown, which utilizes a co-processor to break through the isolation of an operating system domain. Using a multi operating system environment, we manipulate a co-processor in order to circumvent isolation mechanisms on behalf of an attacking operating system. The attack demonstrates an architectural demand to extend the virtualization capabilities of autarkic devices like co- processors.
Date of Conference: 16-18 December 2013
Date Added to IEEE Xplore: 23 January 2014
Electronic ISBN:978-1-4799-2845-3