Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

POSTER: Undetectable task bypassing os scheduler via hardware task switching

Full metadata record
DC Field Value Language
dc.contributor.authorJung, K.J.-
dc.contributor.authorKim, J.S.-
dc.contributor.authorLee, B.H.-
dc.contributor.authorKim, H.S.-
dc.contributor.authorGung, Y.N.-
dc.contributor.authorHan, J.S.-
dc.contributor.authorKim, T.-
dc.contributor.authorChoi, B.J.-
dc.date.available2020-09-14T08:18:23Z-
dc.date.created2019-05-08-
dc.date.issued2018-05-
dc.identifier.issn0000-0000-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/39216-
dc.description.abstractRecently, malicious mining using CPUs has become a trend - mining which the task is not detected by the users is even more of a threat. In this paper, we focused on discovering a new IA-32 1 vulnerability and found an undetectable task using hardware task switching method. The created task is undetectable by the operating system and thus hidden from the system user. Although hardware task switching methods are replaced by more convenient software switching methods in the recent years, they still exist on modern computer systems. By manually manipulating hardware task switching, which is directly managed by the CPU, we show that it is possible to create a hidden scheduler aside from the ones created by the operating system. We demonstrate using a simple CPU consumption example that these hidden tasks have potential to evolve into more sophisticated malicious attacks that can go unnoticed by users. © 2018 Association for Computing Machinery.-
dc.language영어-
dc.language.isoen-
dc.publisherAssociation for Computing Machinery, Inc-
dc.relation.isPartOfASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security-
dc.titlePOSTER: Undetectable task bypassing os scheduler via hardware task switching-
dc.typeArticle-
dc.identifier.doi10.1145/3196494.3201582-
dc.type.rimsART-
dc.identifier.bibliographicCitationASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, pp.801 - 803-
dc.description.journalClass1-
dc.identifier.scopusid2-s2.0-85049154141-
dc.citation.endPage803-
dc.citation.startPage801-
dc.citation.titleASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security-
dc.contributor.affiliatedAuthorChoi, B.J.-
dc.type.docTypeConference Paper-
dc.description.isOpenAccessN-
dc.subject.keywordAuthorCPU usage-
dc.subject.keywordAuthorHardware task switching-
dc.subject.keywordAuthorHiding task-
dc.subject.keywordPlusHardware-
dc.subject.keywordPlusNetwork security-
dc.subject.keywordPlusProgram processors-
dc.subject.keywordPlusScheduling-
dc.subject.keywordPlusSwitching-
dc.subject.keywordPlusHardware tasks-
dc.subject.keywordPlusHiding task-
dc.subject.keywordPlusMalicious attack-
dc.subject.keywordPlusModern computer systems-
dc.subject.keywordPlusSwitching methods-
dc.subject.keywordPlusTrend minings-
dc.subject.keywordPlusComputer hardware-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Choi, Bong Jun photo

Choi, Bong Jun
College of Information Technology (School of Computer Science and Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE