This repository consolidates all artifacts related to the paper "BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect," which was accepted at IEEE S&P 2024. For more details about the attack, please visit our dedicated website, where all relevant documentation is centralized.
DMA-Covert-Channel
Results
: Covert-channel measurements, including channel capacity.src
: Source code for the covert-channel.capacity.sh
: Script to automate the measurement of channel capacity.
tools
heatmap.py
: Tool for plotting the channel matrix (example).profile.py
: Tool for obtaining the pruned matrix from a victim trace.
The repository includes the covert-channel data for the 11 MCUs tested and a trace to the Smart Lock Application (our victim). We also supply the necessary tools to replicate the experiments and enable further research.
The channel capacities were measured using the leakiEst tool (Credits). In the DMA-Covert-Channel folder, you will find a script (capacity.sh
) that automates the execution of this tool and extracts the channel capacity measurements.
Coming soon...
Coming soon...
The channel capacity was measured using the leakiEst tool, developed by researchers from the University of Birmingham. For more information please visit the leakiEst site.
If you find this information useful, please consider citing our work.
@INPROCEEDINGS{BUSted,
author = {C. Rodrigues and D. Oliveira and S. Pinto},
title = {BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect},
booktitle = {2024 IEEE Symposium on Security and Privacy (SP)},
year = {2024}
}