1. Summary
➀ Iago Attacks in which a malicious kernel induces a protected process to act against its interests by manipulating system call return values.
➁ Author has defined a threat model for Iago attacks, implemented a platform for experimenting with Iago attacks.
➂ And use this platform to demonstrate Iago attacks against Linux App which uses malloc().
➃ This paper said that Iago attacks are evidence that protecting applications from malicious kernel is more difficult than previously realized.
➄ And It give a message to us that Malicious kernels can take control of protected applications.
2. Related work Summary
➀ This paper is influenced by Chen’s previous work, Overshadow.
➁ Authors describe attacks that a malicious kernel can mount in system.
3. The Good
➀ Realize of attacks.
➁ Concrete example for malloc was provided for compromising OpenSSL
4. The Bad
➀ if there is a parament verification or verification of address space invariants mechanism by hypervisor, Attack is impossible.
5. Your Comment
To. Author :
➀ Are there system call values that can only be provisionally verified and must be checked for consistency with subsequent return values?
➁ Why you said “Under standing the situation in which verifying return values is easier than computing them“?
'정보보안 > 커널 보안' 카테고리의 다른 글
Rethinking the Lib OS from ... Summary (0) | 2015.10.15 |
---|---|
Inktag Summary (0) | 2015.10.15 |
TrustVisor Summary (0) | 2015.10.15 |
CHERI Summary (0) | 2015.10.15 |
ATRA Summary (0) | 2015.10.15 |