2019
DOI: 10.1007/978-3-030-29962-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Nighthawk: Transparent System Introspection from Ring -3

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Our results show that NIGHTHAWK can detect transient attacks if the attacking time is more than 700ms. However, if the attacking time is less than 400ms, the detection rate decreases linearly because NIGHTHAWK requires a certain amount of execution time, more details in previous work [14].…”
Section: Effectiveness Of Host State Monitoringmentioning
confidence: 99%
See 2 more Smart Citations
“…Our results show that NIGHTHAWK can detect transient attacks if the attacking time is more than 700ms. However, if the attacking time is less than 400ms, the detection rate decreases linearly because NIGHTHAWK requires a certain amount of execution time, more details in previous work [14].…”
Section: Effectiveness Of Host State Monitoringmentioning
confidence: 99%
“…To improve the DMA effectiveness, we enable 4 µDMA channels to parallelly fetch at most 256KB target physical memory one time. More details about µDMA performance are in previous work [14].…”
Section: Efficiencymentioning
confidence: 99%
See 1 more Smart Citation
“…Then we respectively deploy the test approaches, where the domain 0 and VM both use Ubuntu 16.04 and kernel 4.15. Note that ring -3 based Nighthawk is installing on the same platform and does the same introspection work [11]. Thus, we install the Kernel- [8], Hypervisor- [65] and SMM-based defender [66], and use the mpstate to monitor each CPU utilization.…”
Section: ) Comparisonmentioning
confidence: 99%
“…The basic TEE approaches generally use hardware or hypervisor protection to construct isolated environments to protect sensitive computing. Popular hardware features are introduced into commercial machines as transparent and trusted computing bases due to the secure and isolated execution environment-e.g., Intel Management Mode (IME) [11], Intel System Management Mode (SMM) [12], and Trust-Zone [13]. However, the hardware-assisted approaches [14] present the problem of addressing the semantic gap between hardware and software, which requires cooperative technology [15] to construct a secure channel between the TEE and the target system to help transfer and analyze the software data in the TEE without leaking sensitive data.…”
Section: Introductionmentioning
confidence: 99%