Practical Defenses Against Storage Jamming
نویسنده
چکیده
Storage jamming [15] is malicious but surreptitious modification of stored data, to reduce its quality. The person initiating the storage jamming does not receive any direct benefit. Instead, the goal is more indirect, such as deteriorating the position of a competitor. We assume that a Trojan horse does the storage jamming, since the Trojan horse may access data that the attacker cannot. Manual storage jamming is possible, but in general much less effective.
منابع مشابه
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses
This paper describes progress to date on three prototype tools for detecting storage jamming attacks. One prototype uses a replay defense; another uses logical replication, and the third can be used to determine the source and pattern of a detected attack. Three prototype jammers are used to test the effectiveness of the defenses. Initial experiments have shown that access control, encryption, ...
متن کاملOn Security Research towards Future Mobile Network Generations
Over the last decades, numerous security and privacy issues in all three active mobile network generations have been revealed that threaten users as well as network providers. In view of the newest generation (5G) currently under development, we now have the unique opportunity to identify research directions for the next generation based on existing security and privacy issues as well as alread...
متن کاملCAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks
Rowhammer is a hardware bug that can be exploited to implement privilege escalation and remote code execution attacks. Previous proposals on rowhammer mitigation either require hardware changes or follow heuristic-based approaches (based on CPU performance counters). To date, there exists no instant protection against rowhammer attacks on legacy systems. In this paper, we present the design and...
متن کاملTowards a model of storage jamming
Storage jamming can degrade real-world activities that share stored data. Storage jamming is not prevented by access controls or cryptographic techniques. Verification to rule out storage jamming logic is impractical for shrink-wrapped software or low-cost custom applications. Detection mechanisms do offer more promise. In this paper, we model storage jamming and a detection mechanism, using Un...
متن کاملModeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach
Cyber-physical systems rely on distributed embedded wireless nodes for sensing, computation, and control, often leaving them vulnerable to intelligent attacks. Detecting and mitigating such attacks in a resource-efficient manner requires the network to identify the components under attack and adapt its response based on the observed network performance and attack impact. In this paper, we prese...
متن کامل