Mostra i principali dati dell'item
Hardening the security of modern operating systems against side-channel and rowhammer attacks
dc.contributor.author | Oliverio, Marco | |
dc.contributor.author | Pugliese, Andrea | |
dc.contributor.author | Crupi, Felice | |
dc.date.accessioned | 2019-10-21T07:20:48Z | |
dc.date.available | 2019-10-21T07:20:48Z | |
dc.date.issued | 2019-06-20 | |
dc.identifier.uri | http://hdl.handle.net/10955/1667 | |
dc.identifier.uri | https://doi.org/10.13126/unical.it/dottorati/1667 | |
dc.description | Dottorato di Ricerca in Information and Comunications Technology Ciclo XXXI | en_US |
dc.description.abstract | Advancements in exploitation techniques call for the need of advanced defenses. Modern operating systems have to face new sophisticate attacks that do not rely on any programming mistake, rather they exploit leaking information from computational side effects (side-channel attacks) or hardware glitches (rowhammer attacks). Mitigating these new attacks poses new challanges and involves delicate trade-offs, balancing security on one side and performance, simplicity, and compatibility on the other. In this disseration we explore the attack surface exposed by page fusion, a memory saving optimization in modern operating systems and, after that, a secure page fusion implementation called VUsion is shown. We then propose a complete and compatible software solution to rowhammer attacks called ZebRAM. Lastly, we show OpenCAL, a free and general libray for the implementation of Cellular Automata, that can be used in several security scenarios. | en_US |
dc.description.sponsorship | Università della Calabria | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | ING-INF/05; | |
dc.subject | Computer securty | en_US |
dc.subject | Operating systems | en_US |
dc.title | Hardening the security of modern operating systems against side-channel and rowhammer attacks | en_US |
dc.type | Thesis | en_US |