About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Blockchain Technology and Emerging Applications. Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings

Research Article

DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-60037-1_2,
        author={Zheng Zhang and Jingfeng Xue and Tianshi Mu and Ting Yu and Kefan Qiu and Tian Chen and Yuanzhang Li},
        title={DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication},
        proceedings={Blockchain Technology and Emerging Applications. Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings},
        proceedings_a={BLOCKTEA},
        year={2024},
        month={5},
        keywords={Remote attestation Debug registers Self-relocating malware},
        doi={10.1007/978-3-031-60037-1_2}
    }
    
  • Zheng Zhang
    Jingfeng Xue
    Tianshi Mu
    Ting Yu
    Kefan Qiu
    Tian Chen
    Yuanzhang Li
    Year: 2024
    DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication
    BLOCKTEA
    Springer
    DOI: 10.1007/978-3-031-60037-1_2
Zheng Zhang1, Jingfeng Xue1, Tianshi Mu2, Ting Yu2, Kefan Qiu1, Tian Chen1, Yuanzhang Li1,*
  • 1: Beijing Institute of Technology
  • 2: China Southern Power Grid Digital Grid Group Co., Ltd., Guangzhou
*Contact email: popular@bit.edu.cn

Abstract

Remote attestation (RA) is an essential feature in many security protocols to verify the memory integrity of remote embedded (IoT) devices. Several RA techniques have been proposed to verify the remote device binary at the time when a checksum function is executed over a specific memory region. A self-relocating malware may try to move itself to avoid being “caught” by the checksum function because the attestation provides no information about the device binary before the current checksum function execution or between consecutive checksum function executions. Several software-based that lack of dedicated hardware rely on detecting the extra latency incurred by the moving process of self-relocating malware by setting tight time constraints. In this paper, we demonstrate the shortcomings of existing software-based approaches by presenting Debug Register-based Self-relocating Attack (DRSA). DRSA monitors the execution of the checksum function using the debug registers and erases itself before the next attestation. Our evaluation demonstrates that DRSA incurs low overhead, and it is extremely difficult for the verifier to detect it.

Keywords
Remote attestation Debug registers Self-relocating malware
Published
2024-05-03
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-60037-1_2
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL