Feb. 22, 2024, 5:11 a.m. | Stefano Carn\`a, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini

cs.CR updates on arXiv.org arxiv.org

arXiv:2402.13281v1 Announce Type: new
Abstract: We present a kernel-level infrastructure that allows system-wide detection of malicious applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by standard operating systems. This infrastructure relies on hardware performance counters to collect information at runtime from all applications running on the machine. High-level detection metrics are derived from these measurements to maximize the likelihood of promptly detecting a malicious application. Our experimental assessment shows that we can catch a large …

applications arxiv attacks cache channel collect cs.cr csos detection exploit hardware information infrastructure kernel malicious mitigation operating systems performance process runtime side-channel side-channel attacks standard system systems

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States