ИСПОЛЬЗОВАНИЕ АППАРАТНЫХ МЕХАНИЗМОВ ИЗОЛЯЦИИ КАК ПЛАТФОРМЫ ДЛЯ АДАПТИВНОЙ БЕЗОПАСНОСТИ
Аннотация
Ключевые слова
Полный текст:
PDFЛитература
1. Бобков, Сергей Г. и др. Производительность и доверенность вычислительных систем. Безопасность информационных технологий, [S.l.], т. 32, № 3, с. 1-12, 2025. ISSN 2074-7136. DOI: http://dx.doi.org/10.26583/bit.2025.3.01.
Bobkov, Sergey G. et al. Performance and trust of computing systems. IT Security (Russia), [S.l.], v. 32, no. 3,
pp. 1-12, 2025. ISSN 2074-7136. DOI: http://dx.doi.org/10.26583/bit.2025.3.01 (in Russian).
2. Аряшев С.И., Гревцев Н.А., Зубковский П.С., Чибисов П.А., Кулешов А.С., Петров К.А. Разработка программных моделей доверенного универсального микропроцессора и микропроцессорной системы на его основе. Программные продукты и системы. 2022, т. 35, № 4, с. 598-608. DOI: http://dx.doi.org/10.15827/0236-235X.140.598-608.
Aryashev S.I., Grevtsev N.A., Zubkovsky P.S., Chibisov P.A., Kuleshov A.S., Petrov K.A. Development of trusted microprocessor software models and a microprocessor system. Software & Systems, 2022, v. 35, no. 4, pp. 598-608. DOI: http://dx.doi.org/10.15827/0236-235X.140.598-608 (in Russian).
3. Matthew Hoekstra, Reshma Lal, Prashant Pappachan, Vinay Phegade, and Juan Del Cuvillo. Using innovative instructions to create trustworthy software solutions. In NDSS. Citeseer, 2013. DOI: https://doi.org/10.1145/2487726.2488370.
4. Andrew Baumann, Marcus Peinado, and Galen Hunt. Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems (TOCS), 33(3):1-26, 2015. DOI: https://doi.org/10.1145/2799647.
5. David Kaplan, Jeremy Powell, and Tom Woller. Amd memory encryption. In White paper, 2021. DOI: https://doi.org/10.1145/3214292.3214301.
6. Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert Van Doorn. Design and implementation of a tcg-based integrity measurement architecture. In USENIX Security Symposium, volume 13, pp. 223-238. San Diego, CA, USA, 2004. DOI: https://doi.org/10.5555/1251375.1251391.
7. Michael Schwarz, Samuel Li, Samuel Weiser, and Daniel Gruss. Practical enclave malware with intel sgx. arXiv preprint arXiv:2002.05649, 2020. DOI: https://doi.org/10.1007/978-3-030-22038-9_9.
8. Соболев, С.П. (2024). Кибериммунный подход к разработке. Иллюстрация применения на базе микросервисной архитектуры. Вестник Санкт-Петербургского университета. Прикладная математика. Информатика. Процессы управления, 20(1), 52-61. DOI: https://doi.org/10.21638/11701/spbu10.2024.105.
Sobolev, S.P. (2024). Cyber immune development approach. Microservices based illustration. Vestnik Sankt-Peterburgskogo Universiteta. Prikladnaya Matematika. Informatika. Protsessy Upravleniya, 20(1), 52-61. DOI: https://doi.org/10.21638/11701/spbu10.2024.105 (in Russian).
9. Smith and M. Johnson. A survey of artificial immune system based intrusion detection. Journal of Network and Computer Applications, 52:1-20, 2015. DOI: https://doi.org/10.1155/2014/156790.
10. Wilson and S. Taylor. Artificial immune systems in local and network cybersecurity: An overview of intrusion detection strategies. In Proceedings of the International Conference on Cybersecurity, pp. 45-62, 2021. DOI: https://doi.org/10.1201/9780849330452.ch7.
11. Carlos Moratelli, Sergio Johann, and Fabiano Hessel. 2016. Exploring embedded systems virtualization using MIPS virtualization module. In Proceedings of the ACM International Conference on Computing Frontiers (CF '16). Association for Computing Machinery, New York, NY, USA, 214-221. DOI: http://dx.doi.org/10.1145/2903150.2903179.
12. Saar Amar, Tony Chen, David Chisnall, Nathaniel Wesley Filardo, Ben Laurie, Hugo Lefeuvre, Kunyan Liu, Simon W. Moore, Robert Norton-Wright, Margo Seltzer, Yucong Tao, Robert N. M. Watson, and Hongyan Xia. 2025. CHERIoT RTOS: An OS for Fine-Grained Memory-Safe Compartments on Low-Cost Embedded. DOI: https://doi.org/10.1145/3731569.3764844.
13. Кондахчан, Микаэл А.; Гревцев, Никита А.; Чибисов, Петр А. Моделирование безопасности периферийных устройств: реализация и апробация защиты адресных пространств в эмуляторе доверенного микропроцессора. Безопасность информационных технологий, [S.l.], т. 32, № 3, с. 90–99, 2025. ISSN 2074-7136. DOI: http://dx.doi.org/10.26583/bit.2025.3.07.
Kondakhchan, Mikael A.; Grevtsev, Nikita A.; Chibisov, Peter A. Simulation of peripheral device security: implementation and practical evluation of address spaces protection in a trusted microprocessor emulator. IT Security (Russia), [S.l.], v. 32, no. 3, pp. 90-99, 2025. ISSN 2074-7136. DOI: http://dx.doi.org/10.26583/bit.2025.3.07 (in Russian).
14. S. Das, J. Werner, M. Antonakakis, M. Polychronakis and F. Monrose. SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security. IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.2019, pp. 20-38. DOI: http://dx.doi.org/10.1109/SP.2019.00021.
15. Tyler Bletsch, Xuxian Jiang, Vince W. Freeh, and Zhenkai Liang. 2011. Jump-oriented programming: a new class of code-reuse attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11). DOI: https://doi.org/10.1145/1966913.1966919.
16. László Erdődi, Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying, Acta Polytechnica Hungarica. V. 12, no. 5, 2015. DOI: http://dx.doi.org/10.12700/APH.12.5.2015.5.9.
17. CVE-2017-0144. CVE - Common Vulnerabilities and Exposures. The MITRE Corporation. September 9, 2016. p. 1.
18. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, and Raoul Strackx. 2020. Meltdown: reading kernel memory from user space. Commun. ACM 63, 6 (June 2020), 46-56. DOI: https://doi.org/10.1145/3357033.
19. P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg,M. Lipp, S. Mangard, T. Prescher, M. Schwarz, and Y. Yarom. Spectre attacks: Exploiting speculative execution. Communications of the ACM, v. 63,
pp. 93-101, 2020. DOI: https://doi.org/10.1109/SP.2019.00002.
20. Y. Yarom and K. Falkner. Flush+reload: A high resolution, low noise, l3 cache side-channel attack. IACR Cryptol. ePrint Arch., vol. 2013. IACR, 2014, p. 448. DOI: https://doi.org/10.5555/2671225.2671271.
21. M. Schwarz, M. Lipp, D. Moghimi, E. Koruyeh, D. Gruss, J. Krebbel, C. Maurice, D. Genkin, Y. Yarom, and S. Mangard. Zombieload: Cross-privilege-boundary data sampling. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019, pp. 902-917. DOI: https://doi.org/10.48550/arXiv.1905.05726
22. Liu, F., Yarom, Y., Ge, Q., Heiser, G., and Lee, R. B. Last-Level Cache Side-Channel Attacks are Practical. In S&P (2015). DOI: https://doi.org/10.1109/DAC18074.2021.9586119.
23. Y. Jiang, H. Zhu, D. Sullivan, X. Guo, X. Zhang and Y. Jin, "Quantifying Rowhammer Vulnerability for DRAM Security," 2021 58th ACM/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 2021, pp. 73-78, doi: 10.1109/DAC18074.2021.9586119.
24. Z.-L. Zhang, J. Qi, Y. Cheng, S. Jiang, Y. Lin, Y. Gao, S. Nepal, and Y. Zou. A retrospective and futurespective of rowhammer attacks and defenses on dram. ArXiv, vol. abs/2201.02986, 2022.
25. CVE-2022-21882. CVE - Common Vulnerabilities and Exposures. The MITRE Corporation. 2022-01-11.
DOI: http://dx.doi.org/10.26583/bit.2026.1.02
Ссылки
- На текущий момент ссылки отсутствуют.

Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.





