Most of our embedded devices use eMMC, but security into eMMC (as far as I know) has not been extensively studied or taken account of in threat models. In the small sample of devices I’ve looked at, the ability to send raw commands to the eMMC only requires kernel access. If you look at the Android platform, kernel hacks are not uncommon and remote kernel hacks are also not a rarity. There are certain commands that a hacker can send which can permanently disable (brick) a device.
Permanent write protect can be enabled on the main partition or any of the boot partitions. A malicious entity with kernel access to the device can wipe the bootloader and enable permanent write protect and prevent any (even hardware based) recovery.
Card lock will lock the eMMC with a password. No data would be accessible without the password. An adversary could hold your data for hostage and demand payment for a hardware unlocking solution.
This is not meant to be an exhaustive list. There are other attack vectors to watch out for too. For example, if the device uses the RPMB to prevent downgrades, an attacker may corrupt it and prevent boot. The main takeaway here is that having raw eMMC access is dangerous.
So far, the only eMMC based attack in the wild was from a piracy dongle on the 3DS called Gateway. This only affected a small number of users who choose to hack their 3DS with Gateway. However, in the future, we may see an expansion of these kinds of attacks on mobile devices.
The eMMC specifications provides a means of disabling any potentially destructive features either at power-on or permanently. If disabled at “power-on” then it is the trusted bootloader’s prerogative to disable destructive features so when the untrusted kernel is compromised, the attacker won’t be able to use any destructive features. Care must be taken in implementing this solution as reset attacks have to be prevented. Also, this will not prevent any hardware based bricking, although it is unlikely that such a thing can happen remotely.
Permanent disable of features like card lock and write protect will prevent the commands for enabling them from ever working. Device manufacturers who choose to do this must be sure that they would never need to use such a feature in the future. This is the safest solution.
Another potential solution is to treat the eMMC as a secure device under an ARM TrustZone implementation, but this would be specific to ARM based systems.
As a user who wants to secure their eMMC based devices, you can obtain root access and run the permanent disable commands, although such a task is obviously dangerous and should only be attempted by someone with knowledge of eMMC. I hope to write an Android app at some point that can perform this operation, although it is very low priority for me at this point.
Overall, I think more research should be done on the topic of eMMC security. I only have a small sample of devices that I’ve tested and found the disable commands for the destructive actions are not used (therefore an attacker with kernel access can run them). Someone with the resources should perform a study to see how many percentage of devices in the wild has the potential to be compromised with an eMMC attack.
Funny how no one ever tells you these things
Do you think it makes sense to do this as a precaution on a hacked 3ds?
It might only be a matter of time before someone releases a malicious homebrew.
And people was “yadda yadda” when i said “NX (with Android) will be dead on arrival because Android has countless attack vectors.”
Well, If I recall the Vita has an eMMC it should not be to difficult to produce an exploit for it. I know RAM dumps are not possible for the vita because it shares the same board as the other components. Looking back on Yifan’s other posts, dumping a vita game is very possible to find an exploit. I mean you could dump the contents of the game and share it with some of the other vita developers/hackers to try to find an exploit. Then someone would have to find a way to dump the modification back onto the cartridge and see what happens. It is sort of how the PSP was hacked. The only flaws in this method is that it would be rather inconvenient for anyone who just wanted to play a SNES emulator on there vita because they would have knowledge and the tools to do what I have described. Maybe sometime in the near future there maybe a PSvita cartridge reader to make whole process easier. But, I do have my doubts. Oh well ^_^
You can look into Micron’s Authenta eMMC for write or read protection.