[Resource Topic] 2016/227: Process Table Covert Channels: Exploitation and Countermeasures

Welcome to the resource topic for 2016/227

Title:
Process Table Covert Channels: Exploitation and Countermeasures

Authors: Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache

Abstract:

How to securely run untrusted software? A typical answer is to try to isolate the actual effects this software might have. Such counter-measures can take the form of memory segmentation, sandboxing or virtualisation. Besides controlling potential damage this software might do, such methods try to prevent programs from peering into other running programs’ operation and memory. As programs, no matter how many layers of indirection in place, are really being run, they consume resources. Should this resource usage be precisely monitored, malicious programs might be able to communicate in spite of software protections. We demonstrate the existence of such a covert channel bypassing isolations techniques and IPC policies. This covert channel that works over all major consumer OSes (Windows, Linux, MacOS) and relies on exploitation of the process table. We measure the bandwidth of this channel and suggest countermeasures.

ePrint: https://eprint.iacr.org/2016/227

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .