25,131 Hits in 5.6 sec

Virtualization Technology: Cross-VM Cache Side Channel Attacks make it Vulnerable [article]

Alan Litchfield, Abid Shahzad
2016 arXiv   pre-print
Various techniques used by the attackers to launch cache side channel attack are presented, as is a critical analysis of countermeasures against cache side channel attacks.  ...  However, virtualization introduces serious threats to service delivery such as Denial of Service (DoS) attacks, Cross-VM Cache Side Channel attacks, Hypervisor Escape and Hyper-jacking.  ...  , making the solution infeasible for protection against side channel attacks.  ... 
arXiv:1606.01356v1 fatcat:tvyk6qhd2fdbpnjbkth2s3ag7i

Hardware Security (Dagstuhl Seminar 16202)

Osnat Keren, Ilia Polian, Mark M. Tehranipoor, Marc Herbstritt
2016 Dagstuhl Reports  
This report documents the program and outcomes of Dagstuhl Seminar 16202 "Hardware Security", which was held in Schloss Dagstuhl -Leibniz Center for Informatics from May 16-20, 2016.  ...  This seminar aims to bring together a group of researchers, who are actively involved in the design and the security assessment of hardware primitives.  ...  Protecting Cryptographic Components in Hardware against Side-Channel and Fault-Injection Attacks Side-channel analysis and fault-injection attacks are known as major threats to any cryptographic implementation  ... 
doi:10.4230/dagrep.6.5.72 dblp:journals/dagstuhl-reports/KerenPT16 fatcat:dj5xqpsogrgtlgut3oneo6qss4

Combined Attacks and Countermeasures [chapter]

Eric Vetillard, Anthony Ferrari
2010 Lecture Notes in Computer Science  
Logical attacks on smart cards have been used for many years, but their attack potential is hindered by the processes used by issuers to verify the validity of code, in particular bytecode verification  ...  We present practical work done recently on this topic, as well as some countermeasures that can be put in place against such attacks, and how they can be evaluated by security laboratories.  ...  On the other hand, power analysis is very time-consuming, and it remains interesting to include protections against the more efficient alternative for reverse engineering: memory dumps.  ... 
doi:10.1007/978-3-642-12510-2_10 fatcat:ak4v3ya3uzavrexccsc5oobauy

Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments

Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri
2014 Proceedings of the 11th International Conference on Security and Cryptography  
In particular the virtualized environment is supposed to guarantee the impossibility of an adversary to attack a virtual machine e.g., by exploiting a side-channel stemming from the usage of shared physical  ...  To reflect on these observations, we propose a feasibility assessment framework for SCAs using cache based systems as an example scenario.  ...  Hardware-based -Here we consider special hardware that has been deployed to protect the system against the relevant type of attack e.g., tamper resistant crypto modules might be employed to secure the  ... 
doi:10.5220/0005052101130124 dblp:conf/secrypt/Vateva-GurovaLPS14 fatcat:kxzi2kb2ordole7ynfb5odtgdi

SubVirt: implementing malware with virtual machines

S.T. King, P.M. Chen
2006 2006 IEEE Symposium on Security and Privacy (S&P'06)  
We discuss possible ways to detect and prevent VMBRs, and we implement a defense strategy suitable for protecting systems against this threat.  ...  a virtual machine.  ...  We thank the anonymous reviewers and our shepherd, Steve Gribble, for suggestions that helped us improve this paper.  ... 
doi:10.1109/sp.2006.38 dblp:conf/sp/KingCWVWL06 fatcat:ni66zp57gjeqfn64qdzpqzz3yq

Virtualization Technologies and Cloud Security: advantages, issues, and perspectives [article]

Roberto Di Pietro, Flavio Lombardi
2018 arXiv   pre-print
As an example, even hardware virtualization protection/isolation is far from being perfect and uncircumventable, as recently discovered vulnerabilities show.  ...  These features provide an explanation, although partial, of why virtualization has been an enabler for the flourishing of cloud services.  ...  Cloak provides protection against cache-based side-channel attacks for SGX enclaves.  ... 
arXiv:1807.11016v2 fatcat:i724ystx2zcqtgm2aq7bkkkedm

Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities [article]

Mahya Morid Ahmadi, Faiq Khalid, Muhammad Shafique
2021 arXiv   pre-print
The focus of this paper is to analyze the hardware-exploitable side-channel attack using power consumption and software-exploitable side-channel attacks to manipulate cache.  ...  Towards this, we perform an in-depth analysis of the applicability and practical implications of cache attacks on RISC-V microprocessors and their associated challenges.  ...  To protect the RISC-V CPU against power side-channel attacks, Mulder et al. [23] have proposed a masking solution at the architecture level.  ... 
arXiv:2106.08877v1 fatcat:zdalqpzvajatjhvu4ik7ccvwky

A Survey of SCADA Testbed Implementation Approaches

Qais Qassim, Norziana Jamil, Izham Zainal Abidin, Mohd. Ezanee Rusli, Salman Yussof, Roslan Ismail, Fairuz Abdullah, Norhamadi Ja'afar, Hafizah Che Hasan, Maslina Daud
2017 Indian Journal of Science and Technology  
Methods/Statistical Analysis: Cyber attacks exploit SCADA security vulnerabilities in order to take control or disrupt the normal operation of the system.  ...  However, SCADA systems are obvious targets for cyber attacks that would seek to disrupt the critical infrastructure systems thus are governed by a SCADA system.  ...  techniques for SCADA based control systems against a wide range of cyber attacks.  ... 
doi:10.17485/ijst/2017/v10i26/116775 fatcat:qmmt67begzhzjdu6zn7alzxucu

Hardware and Security [chapter]

Gedare Bloom, Eugen Leontie, Bhagirath Narahari, Rahul Simha
2012 Handbook on Securing Cyber-Physical Critical Infrastructure  
To minimize the opportunity for power analysis attacks [97] , the coprocessor is equipped with filters on the power supply. Well-designed shielding on the enclosure obfuscates the heat signature.  ...  [7] uses power analysis for detection of Trojan circuits; they also suggest some other side-channels to investigate.  ... 
doi:10.1016/b978-0-12-415815-3.00012-1 fatcat:usk6j5webjdytjmtjublkukjve

Neverland: Lightweight Hardware Extensions for Enforcing Operating System Integrity [article]

Salessawi Ferede Yitbarek, Todd Austin
2019 arXiv   pre-print
This combination of protections makes it extremely hard for an attacker to tamper with the kernel or introduce new privileged code into the system -- even in the presence of kernel vulnerabilities.  ...  As a result, multiple protections for safeguarding the integrity of kernel code and data are being continuously proposed and deployed.  ...  RISC-V already has an (optional) ISA extension for physical memory protection [61] -which is an approach typically used as a replacement to page-based permissions on low-resource microcontrollers [3  ... 
arXiv:1905.05975v1 fatcat:svibz2rmtbbf5ps5xlcqzg2xnu

A Framework of TPM, SVM and Boot Control for Securing Forensic Logs

Nazanin Borhan, Ramlan Mahmod, Ali Dehghantanha
2012 International Journal of Computer Applications  
Since TPM provides protection before system boot process, it heavily limits the number of attacks that may bypass.  ...  In this paper, we propose a Trusted Module Platform (TPM)-based solution along with using Secure Virtual Machines (SVM) to secure the storage of forensic logs of the system for cyber forensics investigation  ...  Secure Virtual Machine As stated by [23] , virtualization can promote utilization of hardware by 5 to 20 times and can decrease the number of servers in organizations, therefore reduce the power consumption  ... 
doi:10.5120/7831-1042 fatcat:dqoes664tvhencv6gjrv2mwze4

Hardware-oriented security

Ilia Polian
2019 it - Information Technology  
The second article of this issue, "Evaluation of (Power) Side-Channels in Cryptographic Implementations", covers countermeasures against power side-channel analysis on component level.  ...  Therefore, the systems and the information that they are storing and processing are targets of malicious (cyber-)attacks and need to be protected against such attacks.  ... 
doi:10.1515/itit-2019-0008 fatcat:6ytopa2ifved5o4ewwnfzusq7a

Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits

Shih-Wei Li, John S. Koh, Jason Nieh
2019 USENIX Security Symposium  
Hardware virtualization support is used to isolate and protect the trusted core and execute it at a higher privilege level so it can mediate virtual machine exceptions and protect VM data in CPU and memory  ...  We show that HypSec protects the confidentiality and integrity of virtual machines running unmodified guest operating systems while only incurring modest performance overhead for real application workloads  ...  For example, on ARM, HypSec copies selected GPRs to and from intermediate VM state for power management hypercalls to the virtual firmware interface and selected MMIO accesses to virtual hardware.  ... 
dblp:conf/uss/LiKN19 fatcat:a567gleronbzvjmfw7lmowr3wi

[Front matter]

2020 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
The student poster session uses virtual rooms for each poster where attendees can privately view each poster and speak with the author using video or real-time chat.  ...  During the review process, the Program Chairs also recruited additional TPC members as needed.As a virtual event, HOST 2020 offers exciting and innovative ways for attendees, speakers, and sponsors to  ...  protections against possible pointer disclosures.  ... 
doi:10.1109/host45689.2020.9300269 fatcat:nruhx3qym5evvpk3bbki7pvfdq

Where Does Security Stand? New Vulnerabilities vs. Trusted Computing

Shay Gueron, Jean-Pierre Seifert, Geoffrey Strongin, Derek Chiou, Resit Sendag, Joshua J. Yi
2007 IEEE Micro  
There are also new attacks on virtualization hardware and other trustedcomputing hardware being proposed by the security community.  ...  Strongin: It is possible to build systems that are protected against the user. Preventing a user from using administrator privileges provides some protection.  ... 
doi:10.1109/mm.2007.112 fatcat:jbtthgvd5bewxlt52u36kkur5i
« Previous Showing results 1 — 15 out of 25,131 results