Home / Science / Hardware Weakness Enables Operating System Attacks

Hardware Weakness Enables Operating System Attacks

security-weakness-in-several-operating-systems-istock

Researchers from UC Riverside and the State University of New York at Binghamton have demonstrated a serious security weakness in several operating systems by exploiting a hardware vulnerability in a subsystem of the CPU called the branch predictor.
photo credit : iStock

Click for a full size image

Hardware Weakness Enables Operating System Attacks

By Sarah Nightingale

UCR researchers have identified a serious security vulnerability that exposes commonly used operating systems to malicious attacks

A team of researchers from the University of California, Riverside and the State University of New York at Binghamton has identified a weakness in the design of a central processing unit (CPU) component that makes operating systems more vulnerable to malicious attacks. The vulnerability could give hackers complete access to computers and stored information, posing serious risks for individuals, companies, and governments.

The weakness, in the Address Space Layout Randomization (ASLR) defense process, is described in research presented Tuesday, Oct. 18 at the IEEE/ACM International Symposium on Microarchitecture (Micro), one of the top conferences in computer architecture.

Titled “Jump over ASLR: Attacking the Branch Predictor to Bypass ASLR,” the project was led by Nael Abu-Ghazaleh, a professor of computer science and engineering and electrical and computer engineering in UCR’s Bourns College of Engineering, and Dmitry Ponomarev, a professor of computer science at the State University of New York at Binghamton.

Operating systems, which manage computer hardware and software resources and provide common services for computer programs, use ASLR to protect themselves from many types of critical vulnerabilities. ASLR is a memory protection process that randomizes where programs and data are stored in a computer’s memory. It is designed to protect computing systems from common cyber-attack techniques including ‘buffer overflow’ attacks and ‘Return-oriented Programming’ attacks.

The research team identified a way to disable ASLR, bypassing this critical defense. Bypassing ASLR gives hackers the ability to use root exploits to gain complete access to a machine and its stored information, enabling them to steal data or hijack machines.

The researchers demonstrated the weakness in the ubiquitous Linux operating system on Intel processors, and they suspect it also applies to other operating systems such as Windows and Android. The attack also works on virtualization systems such as KVM, which are used as the basis of many cloud computing systems.

Abu-Ghazaleh said that while the attack bypasses a software security defense—ASLR—it was made possible by exploiting a hardware vulnerability in a subsystem of the CPU called the branch predictor, which accelerates the performance of executing programs.
“While most cybersecurity research considers software vulnerabilities and defenses, our research focuses on the underlying hardware and computer architecture, which also play important roles in computer security, both in terms of introducing new vulnerabilities as well as supporting more secure software,” he said.

source : The University of California, Riverside

Telegram Channel

About Mohammad Daeizadeh

Avatar
  • تمامی فایل ها قبل از قرار گیری در سایت تست شده اند.لطفا در صورت بروز هرگونه مشکل از طریق نظرات مارا مطلع سازید.
  • پسورد تمامی فایل های موجود در سایت www.parsseh.com می باشد.(تمامی حروف را می بایست کوچک وارد کنید)
  • Password = www.parsseh.com
  • لطفا نظرات خود را به صورت فارسی بنویسید در صورت تایپ بصورت فینگلیش نظر شما پاک خواهد شد

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.