Defending against malicious peripherals with Cinch

06/04/2015
by   Sebastian Angel, et al.
0

Malicious peripherals designed to attack their host computers are a growing problem. Inexpensive and powerful peripherals that attach to plug-and-play buses have made such attacks easy to mount. Making matters worse, commodity operating systems lack coherent defenses, and users are often unaware of the scope of the problem. We present Cinch, a pragmatic response to this threat. Cinch uses virtualization to attach peripheral devices to a logically separate, untrusted machine, and includes an interposition layer between the untrusted machine and the protected one. This layer regulates interaction with devices according to user-configured policies. Cinch integrates with existing OSes, enforces policies that thwart real-world attacks, and has low overhead.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/26/2021

Defenses Against Multi-Sticker Physical Domain Attacks on Classifiers

Recently, physical domain adversarial attacks have drawn significant att...
research
10/02/2019

Analyzing Control Flow Integrity with LLVM-CFI

Control-flow hijacking attacks are used to perform malicious com-putatio...
research
01/24/2022

DDoSDet: An approach to Detect DDoS attacks using Neural Networks

Cyber-attacks have been one of the deadliest attacks in today's world. O...
research
01/13/2010

DCA for Bot Detection

Ensuring the security of computers is a non-trivial task, with many tech...
research
03/21/2019

From Cyber-Security Deception To Manipulation and Gratification Through Gamification

With the ever growing networking capabilities and services offered to us...
research
09/04/2020

Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching

Data Poisoning attacks involve an attacker modifying training data to ma...

Please sign up or login with your details

Forgot password? Click here to reset