Skip to main content

Showing 1–7 of 7 results for author: Buhren, R

.
  1. arXiv:2304.14717  [pdf, other

    cs.CR

    faulTPM: Exposing AMD fTPMs' Deepest Secrets

    Authors: Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert

    Abstract: Trusted Platform Modules constitute an integral building block of modern security features. Moreover, as Windows 11 made a TPM 2.0 mandatory, they are subject to an ever-increasing academic challenge. While discrete TPMs - as found in higher-end systems - have been susceptible to attacks on their exposed communication interface, more common firmware TPMs (fTPMs) are immune to this attack vector as… ▽ More

    Submitted 2 May, 2023; v1 submitted 28 April, 2023; originally announced April 2023.

    Comments: The first two authors contributed equally. We publish all code necessary to mount the attack under https://github.com/PSPReverse/ftpm_attack. The repository further includes several intermediate results, e.g., flash memory dumps, to retrace the attack process without possessing the target boards and required hardware tools

  2. arXiv:2209.09835  [pdf, other

    cs.CR

    EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware

    Authors: Niclas Kühnapfel, Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Christian Werling, Jean-Pierre Seifert

    Abstract: EMFI has become a popular fault injection (FI) technique due to its ability to inject faults precisely considering timing and location. Recently, ARM, RISC-V, and even x86 processing units in different packages were shown to be vulnerable to electromagnetic fault injection (EMFI) attacks. However, past publications lack a detailed description of the entire attack setup, hindering researchers and c… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: This is the authors' version of the article accepted for publication at IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE 2022)

  3. arXiv:2109.10660  [pdf, other

    cs.CR

    VIA: Analyzing Device Interfaces of Protected Virtual Machines

    Authors: Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert

    Abstract: Both AMD and Intel have presented technologies for confidential computing in cloud environments. The proposed solutions - AMD SEV (-ES, -SNP) and Intel TDX - protect Virtual Machines (VMs) against attacks from higher privileged layers through memory encryption and integrity protection. This model of computation draws a new trust boundary between virtual devices and the VM, which in so far lacks th… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

  4. arXiv:2108.04575  [pdf, other

    cs.CR

    One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization

    Authors: Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert

    Abstract: AMD Secure Encrypted Virtualization (SEV) offers protection mechanisms for virtual machines in untrusted environments through memory and register encryption. To separate security-sensitive operations from software executing on the main x86 cores, SEV leverages the AMD Secure Processor (AMD-SP). This paper introduces a new approach to attack SEV-protected virtual machines (VMs) by targeting the AMD… ▽ More

    Submitted 26 August, 2021; v1 submitted 10 August, 2021; originally announced August 2021.

  5. Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation

    Authors: Robert Buhren, Christian Werling, Jean-Pierre Seifert

    Abstract: Customers of cloud services have to trust the cloud providers, as they control the building blocks that form the cloud. This includes the hypervisor enabling the sharing of a single hardware platform among multiple tenants. AMD Secure Encrypted Virtualization (SEV) claims a new level of protection in cloud scenarios. AMD SEV encrypts the main memory of virtual machines with VM-specific keys, there… ▽ More

    Submitted 2 September, 2019; v1 submitted 30 August, 2019; originally announced August 2019.

  6. arXiv:1612.03744  [pdf, ps, other

    cs.CR

    Fault Attacks on Encrypted General Purpose Compute Platforms

    Authors: Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter

    Abstract: Adversaries with physical access to a target platform can perform cold boot or DMA attacks to extract sensitive data from the RAM. In response, several main-memory encryption schemes have been proposed to prevent such attacks. Also hardware vendors have acknowledged the threat and already announced respective hardware extensions. Intel's SGX and AMD's SME will provide means to encrypt parts of the… ▽ More

    Submitted 12 December, 2016; originally announced December 2016.

  7. arXiv:1612.01119  [pdf, other

    cs.CR

    Security Analysis of Encrypted Virtual Machines

    Authors: Felicitas Hetzelt, Robert Buhren

    Abstract: Cloud computing has become indispensable in today's computer landscape. The flexibility it offers for customers as well as for providers has become a crucial factor for large parts of the computer industry. Virtualization is the key technology that allows for sharing of hardware resources among different customers. The controlling software component, called hypervisor, provides a virtualized view… ▽ More

    Submitted 25 July, 2017; v1 submitted 4 December, 2016; originally announced December 2016.