Visible to the public Cryptographically Secure Detection of Injection Attacks

TitleCryptographically Secure Detection of Injection Attacks
Publication TypeConference Paper
Year of Publication2018
AuthorsLu, Yun, Mitropoulos, Konstantinos, Ostrovsky, Rafail, Weinstock, Avraham, Zikas, Vassilis
Conference NameProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5693-0
Keywordsattestation, composability, Human Behavior, memory corruption, provable security, pubcrawl, Resiliency
AbstractDirect Memory Access (DMA) attacks can allow attackers to access memory directly, bypassing OS supervision or software protections. In this work, we put forth and benchmark a cryptographically secure attestation scheme, which detects DMA attacks. In fact, our scheme detects any attack in a more general class of attacks which we call "direct injection". We prove security of our scheme under a realistic machine model which extends in a non-trivial manner a cryptographic model proposed by Lipton, Ostrovsky, and Zikas (ICALP 2016.) Despite the fact that our scheme, in its current form, protects against write-only attacks, both our security model and our scheme can be extended to allow the attacker to have additional read access to memory--thereby capturing leakage--as well as detecting more types of memory corruptions such as bit flips.
URLhttp://doi.acm.org/10.1145/3243734.3278503
DOI10.1145/3243734.3278503
Citation Keylu_cryptographically_2018