ORSHIN Attack Defense Framework

LCE Instruction flow modification (through micro-probing)

Description

LCE Instruction flow modification (through micro-probing)

CWE

CVE

Attack Surfaces

Memory (MITRE EMB3D PID-12)

MMU (MITRE EMB3D PID-11)

Attack Vectors

FA (MITRE EMB3D TID-105)

Communication Tampering

Reverse Engineering

Defenses

Non-volatile memories should not be extractable through micro-probing attacks, Dedicated countermeasures such as the one created by Texplained and the CEA/ENSM (paper has been published at HOST_23)., Countermeasures are activity monitors that detect the LCE-modified instruction flow.