August 22, 2017 By Larry Loeb 2 min read

Energy management systems that power modern mobile devices are proving to have poor security design, as evidenced by the recent attack method CLKscrew. This is largely due to an emphasis on longer battery life, portability and efficiency rather than security.

Researchers from Columbia University presented their findings about CLKscrew attacks in a paper titled, “CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management,” at the Vancouver USENIX Security Symposium, which detailed how energy management systems could be a way into the processors used in mobile devices. The researchers also showed that the dearth of security found in such systems could allow a remote attack along with the exfiltration of data.

DVFS Affects All Hardware

Analysts focused on dynamic voltage and frequency scaling (DVFS). They studied the ARMv7 processor in particular, but the same sort of system is used on many devices.

The CLKscrew attack does not require physical access to the device or other fault injection equipment, according to the researchers. What it does is bypass the operating limits the vendor has placed on the device. This allows the attack to generate faults that can be exploited through a kernel driver, with a goal of inducing a fault in a subset of an entire victim-thread execution.

The problem stems from a design choice made by the vendors: The voltage and frequency regulators operate on domains that apply to all cores. As the researchers pointed out in their paper, “Any frequency or voltage change initiated by untrusted code inadvertently affects the trusted code execution, despite the hardware-enforced isolation.”

However, the analysts also noted that “the root cause is not a specific hardware or software bug but rather a series of well-thought-out, nevertheless security-oblivious, design decisions.”

Security Not Baked Into Energy Management Systems

SecurityWeek reported that this sort of attack could be used to extract cryptokeys from the ARM’s TrustZone and escalate privileges by loading self-signed code into the TrustZone. Any overlaid operating system (OS), such as Android, could be compromised by the attack.

The researchers said that appropriate vendors have been notified of this situation and mitigation efforts are currently underway.

CLKscrew is a brand new kind of attack that may be only the beginning of others seeking to exploit hardware vulnerabilities. Security professionals must be aware that this avenue exists at all and look to vendors to correct it.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today