{"id":1210,"date":"2021-09-13T12:26:08","date_gmt":"2021-09-13T16:26:08","guid":{"rendered":"https:\/\/ece.ncsu.edu\/?p=242772"},"modified":"2021-09-13T12:26:08","modified_gmt":"2021-09-13T16:26:08","slug":"researchers-develop-toolkit-to-test-apple-security-find-vulnerability","status":"publish","type":"post","link":"https:\/\/my.ece.ncsu.edu\/communications\/2021\/researchers-develop-toolkit-to-test-apple-security-find-vulnerability\/","title":{"rendered":"Researchers Develop Toolkit to Test Apple Security, Find Vulnerability"},"content":{"rendered":"<p><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2021\/09\/aysu-sept-2021-header-1024x576.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"a long line of people are all looking at their smartphones\" loading=\"lazy\" srcset=\"https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2021\/09\/aysu-sept-2021-header-980x551.jpg 980w, https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2021\/09\/aysu-sept-2021-header-480x270.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<p>Researchers from North Carolina State University have developed a software toolkit that allows users to test the hardware security of Apple devices. During their proof-of-concept demonstration, the research team identified a previously unknown vulnerability, which they call iTimed.<\/p>\n<p>\u201cThis toolkit allows us to conduct a variety of fine-grained security experiments that have simply not been possible on Apple devices to this point,\u201d says Aydin Aysu, co-author of a paper on the work and an assistant professor of electrical and computer engineering at NC State.<\/p>\n<p>Apple is well known for creating integrated devices. The design of the devices effectively prevents people from seeing how the devices function internally.<\/p>\n<p>\u201cAs a result, it has been difficult or impossible for independent researchers to verify that Apple devices perform the way that Apple says they perform when it comes to security and privacy,\u201d says Gregor Haas, first author of the paper and a recent master\u2019s graduate from NC State.<\/p>\n<p>However, a hardware vulnerability was uncovered in 2019 called <a href=\"https:\/\/www.wired.co.uk\/article\/ios-jailbreak-checkm8-iphone\"  rel=\"noreferrer noopener\">checkm8<\/a>. It affects several models of iPhone and is essentially an unpatchable flaw.<\/p>\n<p>\u201cWe were able to use checkm8 to get a foothold at the most fundamental level of the device \u2013 when the system begins booting up, we can control the very first code to run on the machine,\u201d Haas says. \u201cWith checkm8 as a starting point, we developed a suite of software tools that allows us to observe what\u2019s happening across the device, to remove or control security measures that Apple has installed, and so on.\u201d<\/p>\n<p>The researchers stress that there are practical reasons for wanting to have third parties assess Apple\u2019s security claims.<\/p>\n<p>\u201cA lot of people interact with Apple\u2019s tech on a daily basis,\u201d Haas says. \u201cAnd the way Apple wants to use its platforms is changing all the time. At some point, there\u2019s value in having independent verification that Apple\u2019s technology is doing what Apple says it is doing, and that its security measures are sound.\u201d<\/p>\n<p>\u201cFor example, we want to know the extent to which attacks that have worked against hardware flaws in other devices might work against Apple devices,\u201d Aysu says.<\/p>\n<p>It didn\u2019t take the researchers long to demonstrate how useful their new toolkit is.<\/p>\n<p>While conducting a proof-of-concept demonstration of the toolkit, the researchers reverse-engineered several key components of Apple&#8217;s hardware and identified a vulnerability to something they named an iTimed attack. It falls under the category of so-called \u201ccache timing side channel attacks,\u201d and effectively allows a program to gain access to cryptographic keys used by one or more programs on an Apple device. With the relevant keys, outside users would then be able to access whatever information the other affected program or programs on the device had access to.<\/p>\n<p>\u201cWe haven\u2019t seen evidence of this attack in the wild yet, but we have notified Apple of the vulnerability,\u201d Aysu says.<\/p>\n<p>The NC State team is sharing much of the toolkit as <a href=\"https:\/\/github.com\/iTimed-Toolkit\/\"  rel=\"noreferrer noopener\">an open-source resource<\/a> for other security researchers.<\/p>\n<p>\u201cWe also plan to use this suite of tools to explore other types of attacks so that we can assess how secure these devices are and identify things we can do to reduce or eliminate these vulnerabilities moving forward,\u201d Aysu says.<\/p>\n<p>The paper, \u201c<a href=\"https:\/\/eprint.iacr.org\/2021\/464.pdf\" data-type=\"URL\" data-id=\"https:\/\/eprint.iacr.org\/2021\/464.pdf\"  rel=\"noreferrer noopener\">iTimed: Cache Attacks on the Apple A10 Fusion SoC<\/a>,\u201d is co-authored by Seetal Potluri, a postdoctoral researcher at NC State. The paper will be presented at the IEEE International Symposium on Hardware Oriented Security and Trust, which is being held Dec. 12-15 in Washington, D.C. The work was done primarily with support from the National Science Foundation under grant 1850373.<\/p>\n<p class=\"has-text-align-center\">-shipman-<\/p>\n<p><strong>Note to Editors:<\/strong> The study abstract follows.<\/p>\n<p><strong>\u201ciTimed: Cache Attacks on the Apple A10 Fusion SoC\u201d<\/strong><\/p>\n<p><em>Authors<\/em>: Gregor Haas, Seetal Potluri and Aydin Aysu, North Carolina State University<\/p>\n<p><em>Presented<\/em>: Dec. 12-15, 2021, at the IEEE International Symposium on Hardware Oriented Security and Trust (HOST) in Washington, DC<\/p>\n<p><strong>Abstract:<\/strong> This paper proposes the first cache timing side-channel attack on one of Apple\u2019s mobile devices. Utilizing a recent, permanent exploit named checkm8, we reverse-engineered Apple\u2019s BootROM and created a powerful toolkit for running arbitrary hardware security experiments on Apple\u2019s in-house designed ARM systems-on-a-chip (SoC). Using this toolkit, we then implement an access-driven cache timing attack (in the style of PRIME+PROBE) as a proof-of-concept illustrator. The advanced hardware control enabled by our toolkit allowed us to reverse-engineer key microarchitectural details of the Apple A10 Fusion\u2019s memory hierarchy. We find that the SoC employs a randomized cache-line replacement policy as well as a hardware-based L1 prefetcher. We propose statistical innovations which specifically account for these hardware structures and thus further the state-of-the-art in cache timing attacks. We find that our access-driven attack, at best, can reduce the security of OpenSSL AES-128 by 50 more bits than a straightforward adaptation of PRIME+PROBE, while requiring only half as many side channel measurement traces.<\/p>\n<p><em>This post was <a href=\"https:\/\/news.ncsu.edu\/2021\/09\/hardware-security-toolkit-itimed\/\">originally published<\/a> in NC State News.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2021\/09\/aysu-sept-2021-header-1024x576.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"a long line of people are all looking at their smartphones\" loading=\"lazy\" srcset=\"https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2021\/09\/aysu-sept-2021-header-980x551.jpg 980w, https:\/\/ece.ncsu.edu\/wp-content\/uploads\/2021\/09\/aysu-sept-2021-header-480x270.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\">New toolkit allows users to test the hardware security of Apple devices and finds iTimed vulnerability<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ncst_dynamicHeaderBlockName":"","ncst_dynamicHeaderData":"","ncst_content_audit_freq":"","ncst_content_audit_date":"","ncst_content_audit_display":false,"ncst_backToTopFlag":"","footnotes":""},"categories":[180,185],"tags":[],"class_list":["post-1210","post","type-post","status-publish","format-standard","hentry","category-research","category-smart"],"displayCategory":null,"acf":{"ncst_posts_meta_modified_date":null},"_links":{"self":[{"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/posts\/1210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/comments?post=1210"}],"version-history":[{"count":2,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/posts\/1210\/revisions"}],"predecessor-version":[{"id":2496,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/posts\/1210\/revisions\/2496"}],"wp:attachment":[{"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/media?parent=1210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/categories?post=1210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/my.ece.ncsu.edu\/communications\/wp-json\/wp\/v2\/tags?post=1210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}