2015
DOI: 10.1145/2842621
|View full text |Cite
|
Sign up to set email alerts
|

Rethinking Memory Permissions for Protection Against Cross-Layer Attacks

Abstract: The inclusive permissions structure (e.g., the Intel ring model) of modern commodity CPUs provides privileged system software layers with arbitrary permissions to access and modify client processes, allowing them to manage these clients and the system resources efficiently. Unfortunately, these inclusive permissions allow a compromised high-privileged software layer to perform arbitrary malicious activities. In this article, our goal is to prevent attacks that cross system layers while maintaining the abilitie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 40 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…Therefore, in the future, it is important to consider mitigation techniques that will close the possibilities for both side channels and covert channels through shared branch prediction units and other shared resources. Identifying and mitigating side and covert channels becomes a high priority research direction in the environments that assume potentially compromised system software layers [McKeen et al 2013;Evtyushkin et al 2014;Elwell et al , 2015Hofmann et al 2013]. In this case, the OS can assist in the creation of the timing channels, circumventing strong isolation [Xu et al 2015].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, in the future, it is important to consider mitigation techniques that will close the possibilities for both side channels and covert channels through shared branch prediction units and other shared resources. Identifying and mitigating side and covert channels becomes a high priority research direction in the environments that assume potentially compromised system software layers [McKeen et al 2013;Evtyushkin et al 2014;Elwell et al , 2015Hofmann et al 2013]. In this case, the OS can assist in the creation of the timing channels, circumventing strong isolation [Xu et al 2015].…”
Section: Related Workmentioning
confidence: 99%
“…Figure 3 shows the overview process for FinTech service-provision environment. In fact, the existing network environment and the FinTech environment are not significantly different [9,11]. The important thing to consider is the financial platform including the bank server.…”
Section: Security Issues and Requirementsmentioning
confidence: 99%