skip to main content
10.1145/3212711.3212715acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
extended-abstract

OS-level Software & Hardware Attacks and Defenses

Authors Info & Claims
Published:10 June 2018Publication History

ABSTRACT

Computing platforms are an integral part of today's society: our transportation, media, financial markets, and even our elections already depend on these systems. Consequently, computing platforms are also highly diverse, ranging from embedded devices in planes and cars, to smartphones, laptops, desktop computers, and powerful servers running the cloud. The Operating System (OS) manages this hardware and provides abstractions for applications running as user-space programs.

The OS usually runs with elevated privileges to protect the platform and other applications from malicious users by enforcing a strict isolation between individual processes. However, all major Operating Systems are written in low-level languages, which provide no guarantees in the presence of bugs. Additionally, hardware implementation flaws enable sophisticated adversaries to exploit the system at run time without requiring memory-corruption vulnerabilities in the system's software.

In this thesis, we evaluate the real-world threat of run-time attacks against Operating Systems despite existing defenses such as Control-Flow Integrity (CFI) being deployed and active. In particular, we show that data-only attacks completely bypass all existing defenses in the kernel. Additionally, Rowhammer-based attacks allow sophisticated adversaries to compromise the OS without requiring any vulnerability in software. We develop novel design strategies for defending the OS against strong user-space attackers and demonstrate feasibility through our prototypes for real-world kernels.

References

  1. It's Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs. Shaza Zeitouni, David Gens, and Ahmad-Reza Sadeghi. In 55th Design Automation Conference (DAC'18), June 2018 {Inproceedings}.Google ScholarGoogle Scholar
  2. CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi. In 26th USENIX Security Symposium, August 2017 {Inproceedings}.Google ScholarGoogle Scholar
  3. LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization. David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi. In 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2017 {Inproceedings}.Google ScholarGoogle Scholar
  4. K-Miner: Uncovering Memory Corruption in Linux. David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi. In 25th Annual Network Distributed System Security Symposium (NDSS), February 2018 {Inproceedings}.Google ScholarGoogle Scholar
  5. PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables. Lucas Davi, David Gens, Lucas Davi, Ahmad-Reza Sadeghi. In 24th Annual Network Distributed System Security Symposium (NDSS), February 2017 {Inproceedings}.Google ScholarGoogle Scholar
  6. JIT Guard: Hardening Just-in-time Compilers with SGX. Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi. In 24th ACM Conference on Computer and Communications Security (CCS), November 2017 {Inproceedings}. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. OS-level Software & Hardware Attacks and Defenses

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiSys PhD Forum '18: Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum
      June 2018
      17 pages
      ISBN:9781450358415
      DOI:10.1145/3212711

      Copyright © 2018 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 June 2018

      Check for updates

      Qualifiers

      • extended-abstract
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate20of20submissions,100%

      Upcoming Conference

      MOBISYS '24
    • Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader