Detecting Peripheral-based Attacks on the Host Memory (T-Labs Series in Telecommunication Services)
暫譯: 檢測基於外圍設備的主機記憶體攻擊(T-Labs電信服務系列)

Patrick Stewin

  • 出版商: Springer
  • 出版日期: 2015-01-14
  • 售價: $4,470
  • 貴賓價: 9.5$4,247
  • 語言: 英文
  • 頁數: 108
  • 裝訂: Hardcover
  • ISBN: 3319135147
  • ISBN-13: 9783319135144
  • 相關分類: 通訊系統 Communication-systems
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.

Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.

商品描述(中文翻譯)

這本書探討了針對主機電腦的隱蔽周邊攻擊,並提出了一種新的檢測方法。周邊設備可以被視為具有專用處理器和專用運行記憶體的獨立系統,以處理其任務。書中針對的問題是,周邊設備通常通過主機的主記憶體與主機進行通信,在此過程中存儲加密金鑰、密碼、打開的檔案及其他敏感數據,這一點是攻擊者迅速利用的。

在這裡,基於孤立微控制器的隱蔽惡意軟體被實施以進行攻擊分析,其結果為開發新型運行時檢測器提供了基礎。該檢測器通過利用某些硬體特性來揭示針對主機主記憶體的隱蔽周邊攻擊,同時一種永久且資源高效的測量策略確保檢測器也能夠檢測瞬時攻擊,否則在僅間歇性測量的情況下,這些攻擊可能會成功。攻擊者利用這一策略,在兩次測量之間攻擊系統,並在系統再次測量之前抹去所有攻擊痕跡。