Hardware Flashcards

(14 cards)

1
Q

What are the basic hardware protections for security?

A

Protected OS and memory protection are essential. Write protection ensures integrity and availability; read protection supports confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Rowhammer attack?

A

Repeatedly accessing adjacent memory rows can cause bit flips in DRAM, violating memory isolation. This has been used to escape sandboxes like Google’s NaCl.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Spectre vulnerability?

A

Spectre abuses speculative execution to access restricted memory by manipulating branch predictors and measuring cache timing side effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Meltdown and how does it differ from Spectre?

A

Meltdown exploits out-of-order execution to read kernel memory from user space, while Spectre abuses speculative execution and timing side channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What makes speculative execution attacks dangerous in browsers?

A

JavaScript can indirectly trigger speculation and use large arrays or timers (e.g., via web workers) to leak memory content through side channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Retbleed?

A

A variant of Spectre that targets return instructions in CPUs. Mitigations exist but add significant performance overhead (up to 39%).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Pointer Authentication and what weakness was discovered?

A

Introduced by ARM, it adds cryptographic signatures to pointers. PACMAN showed speculative execution could guess these codes and bypass protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is hardware hard to turn off completely?

A

Modern devices retain functionality like transit card support even when ‘off’. Malware can persist or be injected during these low-power states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Pantsdown vulnerability?

A

A flaw in BMC hardware allowed unauthorized memory access and firmware reflashing. Fixes require patching both host and BMC firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Hardware Security Modules (HSMs)?

A

Dedicated secure devices used to generate, store, and protect cryptographic keys. Used in passports, games, banking, and smart meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Trusted Platform Module (TPM)?

A

A secure chip that stores keys, ensures platform integrity, and supports remote attestation. TPM 2.0 is required for Windows 11.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Secure Enclave (e.g., Intel SGX, ARM TrustZone)?

A

A trusted execution environment within the processor that isolates sensitive data and code, resistant to external attacks but not speculative or voltage-based attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are common MFA hardware factors?

A

They include something you know (password), something you have (token), and something you are (biometrics), but biometrics and SIM-based methods have notable weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are USB or app-based hardware authenticators?

A

These are physical tokens or mobile apps like Microsoft Authenticator that provide second-factor authentication. They’re secure but depend on implementation quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly