Font Size: a A A

Exploiting processor side channels to enable cross VM malicious code execution

Posted on:2016-05-04Degree:M.SType:Thesis
University:Rensselaer Polytechnic InstituteCandidate:D'Antoine, Sophia MFull Text:PDF
GTID:2478390017980721Subject:Computer Science
Abstract/Summary:
Given the rise in popularity of cloud computing and platform-as-a-service, vulnerabilities inherent to systems which share hardware resources will become increasingly attractive targets to malicious software authors.;This thesis first classifies the possible mediums for hardware side channel construction. Then we construct potential adversarial models associated with each. Additionally, a novel side channel is described and implemented across the central processing unit using out of order execution.;Finally, this thesis constructs seven adversarial applications, one from each adversarial model. These applications are deployed across a novel side channel to prove existence of each exploit. We then analyze successful detection and mitigation techniques of the side channel attacks.
Keywords/Search Tags:Side channel
Related items