The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs

08/13/2021
by   Otto Bittner, et al.
0

Voltage fault injection (FI) is a well-known attack technique that can be used to force faulty behavior in processors during their operation. Glitching the supply voltage can cause data value corruption, skip security checks, or enable protected code paths. At the same time, modern systems on a chip (SoCs) are used in security-critical applications, such as self-driving cars and autonomous machines. Since these embedded devices are often physically accessible by attackers, vendors must consider device tampering in their threat models. However, while the threat of voltage FI is known since the early 2000s, it seems as if vendors still forget to integrate countermeasures. This work shows how the entire boot security of an Nvidia SoC, used in Tesla's autopilot and Mercedes-Benz's infotainment system, can be circumvented using voltage FI. We uncover a hidden bootloader that is only available to the manufacturer for testing purposes and disabled by fuses in shipped products. We demonstrate how to re-enable this bootloader using FI to gain code execution with the highest privileges, enabling us to extract the bootloader's firmware and decryption keys used in later boot stages. Using a hardware implant, an adversary might misuse the hidden bootloader to bypass trusted code execution even during the system's regular operation.

READ FULL TEXT

page 1

page 4

page 5

page 6

page 8

research
02/14/2019

Injecting Software Vulnerabilities with Voltage Glitching

We show how voltage glitching can cause timing violations in CMOS behavi...
research
09/20/2022

EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware

EMFI has become a popular fault injection (FI) technique due to its abil...
research
01/31/2018

Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain

We demonstrate an attack on the secure bootchain of the Nintendo 3DS in ...
research
03/07/2023

Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities

Certification through auditing allows to ensure that critical embedded s...
research
02/01/2018

Attacking the Nintendo 3DS Boot ROMs

We demonstrate attacks on the boot ROMs of the Nintendo 3DS in order to ...
research
04/17/2023

Evil from Within: Machine Learning Backdoors through Hardware Trojans

Backdoors pose a serious threat to machine learning, as they can comprom...
research
03/30/2021

Order P4-66: Characterizing and mitigating surreptitious programmable network device exploitation

Substantial efforts are invested in improving network security, but the ...

Please sign up or login with your details

Forgot password? Click here to reset