While the System Call (SC) interface between the userspace and the Linux Operating System (OS) has received much attention, the interface between the hardware and the OS still lacks thorough analysis. In fact, for many years, a strict hardware-OS security boundary existed in theory, but it was not enforced in practice. Most OS software operated under the assumption of benign hardware, and omitted proper sanitization of peripheral inputs. However, in recent years this view has shifted, as multiple real world attacks arising from compromised hardware have been publicized. This led to the development of hardware and software based mitigations and sparked research interest in analysis methods geared towards the specific properties of hardware-...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
In this thesis, we address the problem faced by modern operating systems due to the exploitation of ...
The computing landscape has significantly changed over the last decades. The devices we use today to...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
This research effort examines the idea of applying virtualization hardware to enhance operating syst...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabil...
Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor layer whi...
Cybercriminals have all the interest in not being detected while perpetrating their intentions. Impe...
Abstract-This paper describes the development of a virtual-machine monitor (VMM) security kernel for...
Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtuali...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
In this thesis, we address the problem faced by modern operating systems due to the exploitation of ...
The computing landscape has significantly changed over the last decades. The devices we use today to...
Kernel-level attacks or rootkits can compromise the security of an operating system by executing wit...
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
This research effort examines the idea of applying virtualization hardware to enhance operating syst...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
Context. The paradigm of virtualization is rapidly changing due to hardware optimization and capabil...
Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor layer whi...
Cybercriminals have all the interest in not being detected while perpetrating their intentions. Impe...
Abstract-This paper describes the development of a virtual-machine monitor (VMM) security kernel for...
Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtuali...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtua...
In this thesis, we address the problem faced by modern operating systems due to the exploitation of ...