Näytä suppeat kuvailutiedot

dc.contributor.authorBen Yehuda, Raz
dc.date.accessioned2021-07-30T12:46:31Z
dc.date.available2021-07-30T12:46:31Z
dc.date.issued2021
dc.identifier.isbn978-951-39-8752-7
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/77233
dc.description.abstractARM architecture keeps extending, and new features are added in each edition of this processor’s architecture. We examine the various techniques to manipulate the ARM hypervisor. In this work, we present a new execution context in the Linux operating system, which we refer to as the hyplet. The hyplet is a technique in which a function of a regular Linux process is executed in the hypervisor. It is through the use of the hyplet that an additional security layer is put inside an executing Linux process, inaccessible to common user space or kernel space privileges. Also, the hyplet provides an infrastructure for a CFI (Control Flow Inspection) technique named C-FLAT, a virtual disk used to trap intruders (honeypot), and a method to acquire coherent memory images for forensics. The acquisition is performed slowly, thereby reduces heat and power, and therefore a good solution for battery-based devices such as smartphones. Also, we show that the hyplet, compared to other RPC (Remote Procedure Call) techniques, provides an extremely fast RPC among Linux Processes. Through the hyplet, it is also possible to execute ISR (interrupt service routine) in a regular user-space Linux process. In Linux it is possible to offload a processor, usually to reduce power. We combined offloading a processor and the hyplet to demonstrate hard real-time. This technology is referred to as the offline hyplet. The offline hyplet demonstrates high-resolution timers, 20Khz, on a relatively slow ARM processor, executing a userspace routine inside a regular Linux process. Other than that, our research presents the hyperwall, a technology to protect network cards. Lastly, we provide a tutorial for a DMA attack on TrustZone running the OP-TEE operating system.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherJyväskylän yliopisto
dc.relation.ispartofseriesJYU dissertations
dc.relation.haspart<b>Artikkeli I:</b> Ben Yehuda, Raz; Wiseman, Yair (2011). The offline scheduler for embedded transportation systems. <i>Proceedings of Industrial Technology (ICIT), IEEE International Conference on. 2011.</i>
dc.relation.haspart<b>Artikkeli II:</b> Ben Yehuda Raz, Zaidenberg Nezer. (2018). Hyplets - Multi Exception Level Kernel towards Linux RTOS. In <i>SYSTOR '18 : Proceedings of the 11th ACM International Systems and Storage Conference June 4-6, 2018, Haifa, Israel (pp. 116-117). ACM.</i> DOI: <a href="https://doi.org/10.1145/3211890.3211917"target="_blank">10.1145/3211890.3211917</a>
dc.relation.haspart<b>Artikkeli III:</b> Yehuda, R. B., Leon, R., & Zaidenberg, N. (2019). Arm security alternatives. In <i>T. Cruz, & P. Simoes (Eds.), ECCWS 2019 : Proceedings of the 18th European Conference on Cyber Warfare and Security (pp. 604-612). Academic Conferences International. Proceedings of the European conference on information warfare and security.</i> JYX: <a href="https://jyx.jyu.fi/handle/123456789/67099"target="_blank"> jyx.jyu.fi/handle/123456789/67099</a>
dc.relation.haspart<b>Artikkeli IV:</b> Kiperberg, Michael; Ben Yehuda, Raz and Zaidenberg. Nezer (2020). HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication. <i>International Conference on Network and System Security. Best paper award.</i> DOI: <a href="https://doi.org/10.1007/978-3-030-65745-1_5"target="_blank">10.1007/978-3-030-65745-1_5</a>
dc.relation.haspart<b>Artikkeli V:</b> Ben Yehuda, R., & Zaidenberg, J. (2020). Protection against reverse engineering in ARM. <i>International Journal of Information Security, 19(1), 39-51.</i> DOI: <a href="https://doi.org/10.1007/s10207-019-00450-1"target="_blank">10.1007/s10207-019-00450-1</a>. JYX: <a href="https://jyx.jyu.fi/handle/123456789/67650"target="_blank"> jyx.jyu.fi/handle/123456789/67650</a>
dc.relation.haspart<b>Artikkeli VI:</b> Ben Yehuda, R., & Zaidenberg, N. J. (2020). The hyplet : Joining a Program and a Nanovisor for real-time and Performance. In <i>SPECTS 2020 : International Symposium on Performance Evaluation of Computer & Telecommunication Systems. IEEE.</i> Full text: <a href="https://ieeexplore.ieee.org/abstract/document/9203743/"target="_blank"> ieeexplore.ieee.org/abstract/document/9203743/</a>. JYX: <a href="https://jyx.jyu.fi/handle/123456789/74090"target="_blank"> jyx.jyu.fi/handle/123456789/74090</a>
dc.relation.haspart<b>Artikkeli VII:</b> Zaidenberg, N. J., Kiperberg, M., Yehuda, R. B., Leon, R., Algawi, A., & Resh, A. (2020). Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot. In <i>P. Mori, S. Furnell, & O. Camp (Eds.), ICISSP 2019 : 5th International Conference on Information Systems Security and Privacy, Revised Selected Papers (pp. 317-334). Springer. Communications in Computer and Information Science, 1221.</i> DOI: <a href="https://doi.org/10.1007/978-3-030-49443-8_15"target="_blank">10.1007/978-3-030-49443-8_15</a>
dc.relation.haspart<b>Artikkeli VIII:</b> Ben Yehuda, R., Shlingbaum, E., Gershfeld, Y., Tayouri, S., & Zaidenberg, N. J. (2021). Hypervisor memory acquisition for ARM. <i>Forensic Science International: Digital Investigation, 37, Article 301106.</i> DOI: <a href="https://doi.org/10.1016/j.fsidi.2020.301106"target="_blank">10.1016/j.fsidi.2020.301106</a>
dc.relation.haspart<b>Artikkeli IX:</b> Ben Yehuda, Raz and Zaidenberg, Nezer. Offline nanovisor. <i>Submitted.</i>
dc.relation.haspart<b>Artikkeli X:</b> Ben Yehuda, Raz; Aronov, Adam; Ekstein, Or; Kiperberg, Michael and Zaidenberg, Nezer. C FLAT nanovised. <i>Submitted.</i>
dc.relation.haspart<b>Artikkeli XI:</b> Stajnord, Ron; Ben Yehuda, Raz and Zaidenberg, Nezer. Attacking Trust-Zone. <i>Submitted.</i>
dc.rightsIn Copyright
dc.titleManipulating the ARM Hypervisor and TrustZone
dc.typeDiss.
dc.identifier.urnURN:ISBN:978-951-39-8752-7
dc.relation.issn2489-9003
dc.rights.copyright© The Author & University of Jyväskylä
dc.rights.accesslevelopenAccess
dc.type.publicationdoctoralThesis
dc.format.contentfulltext
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.date.digitised


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright