Mostra i principali dati dell'item

Hardening the security of modern operating systems against side-channel and rowhammer attacks

dc.contributor.authorOliverio, Marco
dc.contributor.authorPugliese, Andrea
dc.contributor.authorCrupi, Felice
dc.date.accessioned2019-10-21T07:20:48Z
dc.date.available2019-10-21T07:20:48Z
dc.date.issued2019-06-20
dc.identifier.urihttp://hdl.handle.net/10955/1667
dc.identifier.urihttps://doi.org/10.13126/unical.it/dottorati/1667
dc.descriptionDottorato di Ricerca in Information and Comunications Technology Ciclo XXXIen_US
dc.description.abstractAdvancements in exploitation techniques call for the need of advanced defenses. Modern operating systems have to face new sophisticate attacks that do not rely on any programming mistake, rather they exploit leaking information from computational side effects (side-channel attacks) or hardware glitches (rowhammer attacks). Mitigating these new attacks poses new challanges and involves delicate trade-offs, balancing security on one side and performance, simplicity, and compatibility on the other. In this disseration we explore the attack surface exposed by page fusion, a memory saving optimization in modern operating systems and, after that, a secure page fusion implementation called VUsion is shown. We then propose a complete and compatible software solution to rowhammer attacks called ZebRAM. Lastly, we show OpenCAL, a free and general libray for the implementation of Cellular Automata, that can be used in several security scenarios.en_US
dc.description.sponsorshipUniversità della Calabriaen_US
dc.language.isoenen_US
dc.relation.ispartofseriesING-INF/05;
dc.subjectComputer securtyen_US
dc.subjectOperating systemsen_US
dc.titleHardening the security of modern operating systems against side-channel and rowhammer attacksen_US
dc.typeThesisen_US


Files in questo item

Questo item appare nelle seguenti collezioni

Mostra i principali dati dell'item