Feb. 22, 2024, 5:11 a.m. | Stefano Carn\`a, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini

cs.CR updates on arXiv.org arxiv.org

arXiv:2402.13281v1 Announce Type: new
Abstract: We present a kernel-level infrastructure that allows system-wide detection of malicious applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by standard operating systems. This infrastructure relies on hardware performance counters to collect information at runtime from all applications running on the machine. High-level detection metrics are derived from these measurements to maximize the likelihood of promptly detecting a malicious application. Our experimental assessment shows that we can catch a large …

applications arxiv attacks cache channel collect cs.cr csos detection exploit hardware information infrastructure kernel malicious mitigation operating systems performance process runtime side-channel side-channel attacks standard system systems

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden