Harmful devices considered harmless

نویسندگان

  • Riad S. Wahby
  • Sebastian Angel
  • Max Howald
  • Joshua B. Leners
  • Andrew J. Blumberg
  • Michael Walfish
چکیده

Attacks on host computers by malicious peripherals are a growing problem; the inexorable advance of powerful, small, cheap peripherals, which attach to plug-and-play buses, has made such attacks easy to mount. At the same time, commodity operating systems lack systematic defenses. We present Cinch, a pragmatic response to this threat. Cinch transforms USB peripherals to untrusted network endpoints, thereby allowing users and administrators to deploy a rich, existing toolbox from network security (firewalls, VPNs, DPIs, etc.) to defend the computer in a systematic way. Cinch uses virtualization technology to place the hardware in a logically separate and untrusted machine, and includes an interposition layer between the untrusted machine and the protected one. This layer accepts or rejects interaction with devices and enforces strict standards-compliant behavior, presenting to the protected machine the abstraction of “well-behaved” peripherals. We show that Cinch can be easily implemented on existing operating systems, concisely expresses policies that thwart many real-world attacks, and has low overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of the Proposed EU Regulation Concerning Biocide Products and its Opportunities for Alternative Approaches and a Toxicology for the 21 Century

1. For the purposes of this Regulation, the following definitions shall apply: (a) “biocidal products” mean active substances or mixtures containing one or more active substances, put up in the form in which they are supplied to the user, intended to destroy, deter, render harmless, prevent the action of, or otherwise exert a controlling effect on any harmful organism by chemical or biological ...

متن کامل

Lethal and Sublethal Effects of Insecticides Used on Citrus, on the Ectoparasitoid Tamarixia radiata

Huanglongbing (HLB) is a disease associated with the bacteria "Candidatus Liberibacter spp." and has been devastating citrus orchards around the world. Its management involves control of the insect vector, the Asian citrus psyllid Diaphorina citri Kuwayama. However, the indiscriminate use of chemicals has caused pest outbreaks and eliminated the natural enemies of the vector, such as the parasi...

متن کامل

Priming family values: How being a parent affects moral evaluations of harmless but offensive acts

0022-1031/$ see front matter 2009 Elsevier Inc. A doi:10.1016/j.jesp.2009.06.017 * Corresponding author. Fax: +1 519 746 8631. E-mail address: [email protected] (R.P. Eibach In modern liberal societies people are generally reluctant to morally condemn acts that they find personally distasteful so long as those acts are not harmful or unfair to others. However, in providing character educatio...

متن کامل

Embracing interference in wireless systems

The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This dissertation takes an alternate a...

متن کامل

Length Is Associated with Pain: Jellyfish with Painful Sting Have Longer Nematocyst Tubules than Harmless Jellyfish

A large number of humans are stung by jellyfish all over the world. The stings cause acute pain followed by persistent pain and local inflammation. Harmful jellyfish species typically cause strong pain, whereas harmless jellyfish cause subtle or no pain. Jellyfish sting humans by injecting a tubule, contained in the nematocyst, the stinging organ of jellyfish. The tubule penetrates into the ski...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1506.01449  شماره 

صفحات  -

تاریخ انتشار 2015