Attack and Defense with Hardware-Aided Security

Files

TR Number

Date

2016-08-26

Journal Title

Journal ISSN

Volume Title

Publisher

Virginia Tech

Abstract

Riding on recent advances in computing and networking, our society is now experiencing the evolution into the age of information. While the development of these technologies brings great value to our daily life, the lucrative reward from cyber-crimes has also attracted criminals. As computing continues to play an increasing role in the society, security has become a pressing issue. Failures in computing systems could result in loss of infrastructure or human life, as demonstrated in both academic research and production environment. With the continuing widespread of malicious software and new vulnerabilities revealing every day, protecting the heterogeneous computing systems across the Internet has become a daunting task. Our approach to this challenge consists of two directions. The first direction aims to gain a better understanding of the inner working of both attacks and defenses in the cyber environment. Meanwhile, our other direction is designing secure systems in adversarial environment.

Description

Keywords

Trusted Execution Environment, Hardware-Assisted Security, Secure Execution, Cache, Rootkit

Citation