操作系统级软硬件攻击与防御

David Gens
{"title":"操作系统级软硬件攻击与防御","authors":"David Gens","doi":"10.1145/3212711.3212715","DOIUrl":null,"url":null,"abstract":"Computing platforms are an integral part of today's society: our transportation, media, financial markets, and even our elections already depend on these systems. Consequently, computing platforms are also highly diverse, ranging from embedded devices in planes and cars, to smartphones, laptops, desktop computers, and powerful servers running the cloud. The Operating System (OS) manages this hardware and provides abstractions for applications running as user-space programs. The OS usually runs with elevated privileges to protect the platform and other applications from malicious users by enforcing a strict isolation between individual processes. However, all major Operating Systems are written in low-level languages, which provide no guarantees in the presence of bugs. Additionally, hardware implementation flaws enable sophisticated adversaries to exploit the system at run time without requiring memory-corruption vulnerabilities in the system's software. In this thesis, we evaluate the real-world threat of run-time attacks against Operating Systems despite existing defenses such as Control-Flow Integrity (CFI) being deployed and active. In particular, we show that data-only attacks completely bypass all existing defenses in the kernel. Additionally, Rowhammer-based attacks allow sophisticated adversaries to compromise the OS without requiring any vulnerability in software. We develop novel design strategies for defending the OS against strong user-space attackers and demonstrate feasibility through our prototypes for real-world kernels.","PeriodicalId":376336,"journal":{"name":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"OS-level Software & Hardware Attacks and Defenses\",\"authors\":\"David Gens\",\"doi\":\"10.1145/3212711.3212715\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computing platforms are an integral part of today's society: our transportation, media, financial markets, and even our elections already depend on these systems. Consequently, computing platforms are also highly diverse, ranging from embedded devices in planes and cars, to smartphones, laptops, desktop computers, and powerful servers running the cloud. The Operating System (OS) manages this hardware and provides abstractions for applications running as user-space programs. The OS usually runs with elevated privileges to protect the platform and other applications from malicious users by enforcing a strict isolation between individual processes. However, all major Operating Systems are written in low-level languages, which provide no guarantees in the presence of bugs. Additionally, hardware implementation flaws enable sophisticated adversaries to exploit the system at run time without requiring memory-corruption vulnerabilities in the system's software. In this thesis, we evaluate the real-world threat of run-time attacks against Operating Systems despite existing defenses such as Control-Flow Integrity (CFI) being deployed and active. In particular, we show that data-only attacks completely bypass all existing defenses in the kernel. Additionally, Rowhammer-based attacks allow sophisticated adversaries to compromise the OS without requiring any vulnerability in software. We develop novel design strategies for defending the OS against strong user-space attackers and demonstrate feasibility through our prototypes for real-world kernels.\",\"PeriodicalId\":376336,\"journal\":{\"name\":\"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3212711.3212715\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2018 Workshop on MobiSys 2018 Ph.D. Forum","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3212711.3212715","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

计算平台是当今社会不可或缺的一部分:我们的交通、媒体、金融市场,甚至我们的选举都已经依赖于这些系统。因此,计算平台也高度多样化,从飞机和汽车中的嵌入式设备,到智能手机、笔记本电脑、台式电脑和运行云的强大服务器。操作系统(OS)管理这些硬件,并为作为用户空间程序运行的应用程序提供抽象。操作系统通常以更高的权限运行,通过强制各个进程之间的严格隔离来保护平台和其他应用程序免受恶意用户的攻击。然而,所有主要的操作系统都是用低级语言编写的,这不能保证存在错误。此外,硬件实现缺陷使老练的攻击者能够在运行时利用系统,而不需要系统软件中存在内存损坏漏洞。在本文中,我们评估了现实世界中针对操作系统的运行时攻击的威胁,尽管现有的防御措施,如控制流完整性(CFI)已经部署和激活。特别是,我们展示了纯数据攻击完全绕过了内核中所有现有的防御。此外,基于rowhhammer的攻击允许复杂的对手在不需要软件存在任何漏洞的情况下破坏操作系统。我们开发了新颖的设计策略来保护操作系统免受强大的用户空间攻击者的攻击,并通过我们的真实内核原型演示了可行性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
OS-level Software & Hardware Attacks and Defenses
Computing platforms are an integral part of today's society: our transportation, media, financial markets, and even our elections already depend on these systems. Consequently, computing platforms are also highly diverse, ranging from embedded devices in planes and cars, to smartphones, laptops, desktop computers, and powerful servers running the cloud. The Operating System (OS) manages this hardware and provides abstractions for applications running as user-space programs. The OS usually runs with elevated privileges to protect the platform and other applications from malicious users by enforcing a strict isolation between individual processes. However, all major Operating Systems are written in low-level languages, which provide no guarantees in the presence of bugs. Additionally, hardware implementation flaws enable sophisticated adversaries to exploit the system at run time without requiring memory-corruption vulnerabilities in the system's software. In this thesis, we evaluate the real-world threat of run-time attacks against Operating Systems despite existing defenses such as Control-Flow Integrity (CFI) being deployed and active. In particular, we show that data-only attacks completely bypass all existing defenses in the kernel. Additionally, Rowhammer-based attacks allow sophisticated adversaries to compromise the OS without requiring any vulnerability in software. We develop novel design strategies for defending the OS against strong user-space attackers and demonstrate feasibility through our prototypes for real-world kernels.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信