POSTER: Undetectable task bypassing os scheduler via hardware task switching
- Authors
- Jung, K.J.; Kim, J.S.; Lee, B.H.; Kim, H.S.; Gung, Y.N.; Han, J.S.; Kim, T.; Choi, B.J.
- Issue Date
- May-2018
- Publisher
- Association for Computing Machinery, Inc
- Keywords
- CPU usage; Hardware task switching; Hiding task
- Citation
- ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, pp.801 - 803
- Journal Title
- ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
- Start Page
- 801
- End Page
- 803
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/39216
- DOI
- 10.1145/3196494.3201582
- ISSN
- 0000-0000
- Abstract
- Recently, malicious mining using CPUs has become a trend - mining which the task is not detected by the users is even more of a threat. In this paper, we focused on discovering a new IA-32 1 vulnerability and found an undetectable task using hardware task switching method. The created task is undetectable by the operating system and thus hidden from the system user. Although hardware task switching methods are replaced by more convenient software switching methods in the recent years, they still exist on modern computer systems. By manually manipulating hardware task switching, which is directly managed by the CPU, we show that it is possible to create a hidden scheduler aside from the ones created by the operating system. We demonstrate using a simple CPU consumption example that these hidden tasks have potential to evolve into more sophisticated malicious attacks that can go unnoticed by users. © 2018 Association for Computing Machinery.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Information Technology > School of Computer Science and Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/39216)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.