Difference between revisions of "Plundervolt"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Created page with "== Summary == Description what this documentation is about. == Requirements == * Operating system: Ubuntu 18.04 bionic amd64 * Packages: git emacs In order to complete th...")
 
Line 1: Line 1:
== Summary ==  
== Summary ==  


Description what this documentation is about.
Plundervolt is a [[Fault Injection Attack]]


== Requirements ==
== Description ==


* Operating system: Ubuntu 18.04 bionic amd64
Plundervolt, also known as CVE-2019-11157, is a vulnerability that relies on the fact that if you run an Intel Core x86 processors, on a voltage that’s a little bit lower than it usually expects, e.g., 0.9V instead of 1.0V, it may carry on working almost as normal, but get some calculations very slightly wrong.
* Packages: git emacs


In order to complete these steps, you must have followed [[Some Other Documentation]] before.
== Attack Vectors ==
 
== Description ==


=== Step 1 ===
=== Breaking AES-NI ===


Enter these commands in the shell
Enter these commands in the shell
Line 19: Line 16:
  echo bar
  echo bar


=== Step 2 ===
=== Faulting Memory Allocations ===


Make sure to read
Make sure to read
Line 27: Line 24:
* The Baroque Cycle
* The Baroque Cycle


== Used Hardware ==
== Mitigation and Countermeasures ==


[[Device to be used with this documentation]]
[[Device to be used with this documentation]]
Line 34: Line 31:
== Courses ==
== Courses ==


* [[A course where this documentation was used]] (2017, 2018)
* [[Ausgewählte Kapitel der IT-Security]] (2021)
* [[Another one]] (2018)


== References ==
== References ==

Revision as of 21:58, 21 December 2021

Summary

Plundervolt is a Fault Injection Attack

Description

Plundervolt, also known as CVE-2019-11157, is a vulnerability that relies on the fact that if you run an Intel Core x86 processors, on a voltage that’s a little bit lower than it usually expects, e.g., 0.9V instead of 1.0V, it may carry on working almost as normal, but get some calculations very slightly wrong.

Attack Vectors

Breaking AES-NI

Enter these commands in the shell

echo foo
echo bar

Faulting Memory Allocations

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Mitigation and Countermeasures

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

References