Discovering New Vulnerabilities in Computer Systems

Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing. to effectively prot...

Full description

Bibliographic Details
Main Author: Wu, Zhenyu
Format: Others
Language:English
Published: W&M ScholarWorks 2012
Subjects:
Online Access:https://scholarworks.wm.edu/etd/1539623356
https://scholarworks.wm.edu/cgi/viewcontent.cgi?article=3147&context=etd
id ndltd-wm.edu-oai-scholarworks.wm.edu-etd-3147
record_format oai_dc
spelling ndltd-wm.edu-oai-scholarworks.wm.edu-etd-31472019-05-16T03:34:34Z Discovering New Vulnerabilities in Computer Systems Wu, Zhenyu Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing. to effectively protect computer systems from devastation, it is imperative to discover and mitigate vulnerabilities before they fall into the offensive parties' hands. This dissertation is dedicated to the research and discovery of new design and deployment vulnerabilities in three very different types of computer systems.;The first vulnerability is found in the automatic malicious binary (malware) detection system. Binary analysis, a central piece of technology for malware detection, are divided into two classes, static analysis and dynamic analysis. State-of-the-art detection systems employ both classes of analyses to complement each other's strengths and weaknesses for improved detection results. However, we found that the commonly seen design patterns may suffer from evasion attacks. We demonstrate attacks on the vulnerabilities by designing and implementing a novel binary obfuscation technique.;The second vulnerability is located in the design of server system power management. Technological advancements have improved server system power efficiency and facilitated energy proportional computing. However, the change of power profile makes the power consumption subjected to unaudited influences of remote parties, leaving the server systems vulnerable to energy-targeted malicious exploit. We demonstrate an energy abusing attack on a standalone open Web server, measure the extent of the damage, and present a preliminary defense strategy.;The third vulnerability is discovered in the application of server virtualization technologies. Server virtualization greatly benefits today's data centers and brings pervasive cloud computing a step closer to the general public. However, the practice of physical co-hosting virtual machines with different security privileges risks introducing covert channels that seriously threaten the information security in the cloud. We study the construction of high-bandwidth covert channels via the memory sub-system, and show a practical exploit of cross-virtual-machine covert channels on virtualized x86 platforms. 2012-01-01T08:00:00Z text application/pdf https://scholarworks.wm.edu/etd/1539623356 https://scholarworks.wm.edu/cgi/viewcontent.cgi?article=3147&context=etd © The Author Dissertations, Theses, and Masters Projects English W&M ScholarWorks Computer Sciences
collection NDLTD
language English
format Others
sources NDLTD
topic Computer Sciences
spellingShingle Computer Sciences
Wu, Zhenyu
Discovering New Vulnerabilities in Computer Systems
description Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing. to effectively protect computer systems from devastation, it is imperative to discover and mitigate vulnerabilities before they fall into the offensive parties' hands. This dissertation is dedicated to the research and discovery of new design and deployment vulnerabilities in three very different types of computer systems.;The first vulnerability is found in the automatic malicious binary (malware) detection system. Binary analysis, a central piece of technology for malware detection, are divided into two classes, static analysis and dynamic analysis. State-of-the-art detection systems employ both classes of analyses to complement each other's strengths and weaknesses for improved detection results. However, we found that the commonly seen design patterns may suffer from evasion attacks. We demonstrate attacks on the vulnerabilities by designing and implementing a novel binary obfuscation technique.;The second vulnerability is located in the design of server system power management. Technological advancements have improved server system power efficiency and facilitated energy proportional computing. However, the change of power profile makes the power consumption subjected to unaudited influences of remote parties, leaving the server systems vulnerable to energy-targeted malicious exploit. We demonstrate an energy abusing attack on a standalone open Web server, measure the extent of the damage, and present a preliminary defense strategy.;The third vulnerability is discovered in the application of server virtualization technologies. Server virtualization greatly benefits today's data centers and brings pervasive cloud computing a step closer to the general public. However, the practice of physical co-hosting virtual machines with different security privileges risks introducing covert channels that seriously threaten the information security in the cloud. We study the construction of high-bandwidth covert channels via the memory sub-system, and show a practical exploit of cross-virtual-machine covert channels on virtualized x86 platforms.
author Wu, Zhenyu
author_facet Wu, Zhenyu
author_sort Wu, Zhenyu
title Discovering New Vulnerabilities in Computer Systems
title_short Discovering New Vulnerabilities in Computer Systems
title_full Discovering New Vulnerabilities in Computer Systems
title_fullStr Discovering New Vulnerabilities in Computer Systems
title_full_unstemmed Discovering New Vulnerabilities in Computer Systems
title_sort discovering new vulnerabilities in computer systems
publisher W&M ScholarWorks
publishDate 2012
url https://scholarworks.wm.edu/etd/1539623356
https://scholarworks.wm.edu/cgi/viewcontent.cgi?article=3147&context=etd
work_keys_str_mv AT wuzhenyu discoveringnewvulnerabilitiesincomputersystems
_version_ 1719187239119880192