arXiv Open Access 2015

Defending against malicious peripherals with Cinch

Sebastian Angel Riad S. Wahby Max Howald Joshua B. Leners Michael Spilo +3 lainnya
Lihat Sumber

Abstrak

Malicious peripherals designed to attack their host computers are a growing problem. Inexpensive and powerful peripherals that attach to plug-and-play buses have made such attacks easy to mount. Making matters worse, commodity operating systems lack coherent defenses, and users are often unaware of the scope of the problem. We present Cinch, a pragmatic response to this threat. Cinch uses virtualization to attach peripheral devices to a logically separate, untrusted machine, and includes an interposition layer between the untrusted machine and the protected one. This layer regulates interaction with devices according to user-configured policies. Cinch integrates with existing OSes, enforces policies that thwart real-world attacks, and has low overhead.

Topik & Kata Kunci

Penulis (8)

S

Sebastian Angel

R

Riad S. Wahby

M

Max Howald

J

Joshua B. Leners

M

Michael Spilo

Z

Zhen Sun

A

Andrew J. Blumberg

M

Michael Walfish

Format Sitasi

Angel, S., Wahby, R.S., Howald, M., Leners, J.B., Spilo, M., Sun, Z. et al. (2015). Defending against malicious peripherals with Cinch. https://arxiv.org/abs/1506.01449

Akses Cepat

Lihat di Sumber
Informasi Jurnal
Tahun Terbit
2015
Bahasa
en
Sumber Database
arXiv
Akses
Open Access ✓