http://bit.do/3Vqt Best mobile spy app secret promo: 60%OFF
[Title] DeviceDisEnabler : A hypervisor which hides devices to protect cyber espionage [Abstract] Current mobile gadgets includes of rich devices (high resolution video camera, microphone, GPS, etc) which enable high quantity communication (Video conference, current location data, etc). Unfortunately, the rich devices make easy to conduct cyber espionage. For example, a high resolution video is used to read the text on a display. A GPS device is used to track the user's location ("Cerberus" and "mSpy" are famous. Japanese application named "karelog" became social issues). These devices are not used in company's office or factory and computer administrators want to prohibit these devices. Unfortunately, the devices are embedded in a mobile gadget and most of them cannot be disenabled by BIOS or EFI. In order to In order to solve this problem, we propose a thin hypervisor called "DeviceDisEnabler (DDE)", which hides some devices from OS. DDE is a lightweight hypervisor and can be inserted to a pre-installed OS. Although the OS uses "IN" instruction to get the device information on PCI and USB (Vendor ID, Device Class, etc), the "IN" instruction is hooked by DDE and the device information is hidden if the devices is prohibited in the company. Unfortunately, not only attackers but also employees want to bypass the DDE because they want to use the devices. In order to protect bypassing the DDE, it encrypts the disk image of the OS. It means the OS cannot be used without the help of DDE. In order to hide the encryption key, the DDE has three types of key managements (A technique gets a key from the Internet with a secure communication. A technique hides the key into a TPM chip and obtains it at a certain state of boot time only. A technique obfuscates the key into the code using Whitebox Cryptography technique). Current implementation is based on BitVisor 1.4 and the target is a mobile gadget which has Intel CPU. I will talk about the requirements for ARM CPU based implementation. [Bio] Kuniyasu Suzaki He has worked at Research Institute for Secure Systems (RISEC) of National Institute of Advanced Industrial Science and Technology (AIST). He got his Ph.D (Computer Science) from the University of Tokyo. His research interests are security on operating systems and virtual machines. He was a board member of Cloud Security Alliance Japan Chapter (2010-13). He got IPA's OSS contribution awards (2010) by maintenance of KNOPPIX Japanese edition. He made presentations at ICSJWG'14 Fall (a meeting hosted by U.S. DHS), BlackHat SaoPaulo'14, S4x14 (SCADA Security Scientific Symposium), EuroSec'12, EuroSec'11, Ottawa Linux Symposium'11,, BlackHat'10, etc.
Niciun comentariu:
Trimiteți un comentariu