Defending against malicious peripherals with Cinch

by   Sebastian Angel, et al.

Malicious peripherals designed to attack their host computers are a growing problem. Inexpensive and powerful peripherals that attach to plug-and-play buses have made such attacks easy to mount. Making matters worse, commodity operating systems lack coherent defenses, and users are often unaware of the scope of the problem. We present Cinch, a pragmatic response to this threat. Cinch uses virtualization to attach peripheral devices to a logically separate, untrusted machine, and includes an interposition layer between the untrusted machine and the protected one. This layer regulates interaction with devices according to user-configured policies. Cinch integrates with existing OSes, enforces policies that thwart real-world attacks, and has low overhead.


page 1

page 2

page 3

page 4


Defenses Against Multi-Sticker Physical Domain Attacks on Classifiers

Recently, physical domain adversarial attacks have drawn significant att...

Analyzing Control Flow Integrity with LLVM-CFI

Control-flow hijacking attacks are used to perform malicious com-putatio...

DDoSDet: An approach to Detect DDoS attacks using Neural Networks

Cyber-attacks have been one of the deadliest attacks in today's world. O...

Detecting Malicious URLs of COVID-19 Pandemic using ML technologies

Throughout the COVID-19 outbreak, malicious attacks have become more per...

From Cyber-Security Deception To Manipulation and Gratification Through Gamification

With the ever growing networking capabilities and services offered to us...

Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching

Data Poisoning attacks involve an attacker modifying training data to ma...

RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis

Encryption ransomware has become a notorious malware. It encrypts user d...