Log in

View Full Version : ARM and X-Scale Processors Subject To Attack?


Ed Hansberry
04-05-2007, 11:00 PM
<a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;taxonomyName=security&amp;articleId=9015618&amp;taxonomyId=17">http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;taxonomyName=security&amp;articleId=9015618&amp;taxonomyId=17</a><br /><br /><i>"A security researcher at Juniper Networks Inc. says he plans to demonstrate a new class of attack that can be used to compromise electronic devices like routers or mobile phones. The vulnerability lies in the Arm and XScale microprocessors, two chips that are widely used in these "embedded" devices. "There are interesting quirks in the ARM and XScale architectures that make things very easy for an attacker," said Juniper's Barnaby Jack. The technique he has developed is "100 percent reliable, and it results in code execution on the device," he said."</i><br /><br />The attack has to do with exploiting a testing interface on the chip, not a buffer overflow vulnerability in the operating system or application, which is the case with most attacks today. The testing interface can be turned off, but I am not sure if it requires the OEM to physically do that or if a program can be download to turn it off, thereby closing the security hole. I would think something like this would require at least BIOS level access to enable/disable. Not pretty. Just for the record, ARM is the architecture used by Windows Mobile devices, and has been since 2000. Before that, a variety of chips were used, like SHx and MIPS.

virain
04-06-2007, 09:19 AM
Sometimes, I think that all those antivirus soft makers invent them to scare us, and ruin our devices so they could sell their stuff to us :twisted:

PDATek
04-09-2007, 01:46 PM
Is this a problem ?

No, because it's not a pure software but a hardware attack.

The "attacker" has to steal my device, open it and connect a JTAG interface to this device.

There are several easier methods to debug or "attack" an application than using JTAG :roll:

Ed Hansberry
04-10-2007, 05:16 AM
Is this a problem ?

No, because it's not a pure software but a hardware attack.

The "attacker" has to steal my device, open it and connect a JTAG interface to this device.

"An attacker could launch this type of attack to run unauthorized software on a device connected to the network."

doesn't look like physical access is necessary.