25 research outputs found

    Automating Seccomp Filter Generation for Linux Applications

    Get PDF
    Software vulnerabilities in applications undermine the security of applications. By blocking unused functionality, the impact of potential exploits can be reduced. While seccomp provides a solution for filtering syscalls, it requires manual implementation of filter rules for each individual application. Recent work has investigated automated approaches for detecting and installing the necessary filter rules. However, as we show, these approaches make assumptions that are not necessary or require overly time-consuming analysis. In this paper, we propose Chestnut, an automated approach for generating strict syscall filters for Linux userspace applications with lower requirements and limitations. Chestnut comprises two phases, with the first phase consisting of two static components, i.e., a compiler and a binary analyzer, that extract the used syscalls during compilation or in an analysis of the binary. The compiler-based approach of Chestnut is up to factor 73 faster than previous approaches without affecting the accuracy adversely. On the binary analysis level, we demonstrate that the requirement of position-independent binaries of related work is not needed, enlarging the set of applications for which Chestnut is usable. In an optional second phase, Chestnut provides a dynamic refinement tool that allows restricting the set of allowed syscalls further. We demonstrate that Chestnut on average blocks 302 syscalls (86.5%) via the compiler and 288 (82.5%) using the binary-level analysis on a set of 18 widely used applications. We found that Chestnut blocks the dangerous exec syscall in 50% and 77.7% of the tested applications using the compiler- and binary-based approach, respectively. For the tested applications, Chestnut prevents exploitation of more than 62% of the 175 CVEs that target the kernel via syscalls. Finally, we perform a 6 month long-term study of a sandboxed Nginx server

    Systematic analysis of programming languages and their execution environments for spectre attacks

    Get PDF
    In this paper, we analyze the security of programming languages and their execution environments (compilers and interpreters) with respect to Spectre attacks. The analysis shows that only 16 out of 42 execution environments have mitigations against at least one Spectre variant, i.e., 26 have no mitigations against any Spectre variant. Using our novel tool Speconnector, we develop Spectre proof-of-concept attacks in 8 programming languages and on code generated by 11 execution environments that were previously not known to be affected. Our results highlight some programming languages that are used to implement security-critical code, but remain entirely unprotected, even three years after the discovery of Spectre

    A Systematic Evaluation of Transient Execution Attacks and Defenses

    Get PDF
    Research on transient execution attacks including Spectre and Meltdown showed that exception or branch misprediction events might leave secret-dependent traces in the CPU's microarchitectural state. This observation led to a proliferation of new Spectre and Meltdown attack variants and even more ad-hoc defenses (e.g., microcode and software patches). Both the industry and academia are now focusing on finding effective defenses for known issues. However, we only have limited insight on residual attack surface and the completeness of the proposed defenses. In this paper, we present a systematization of transient execution attacks. Our systematization uncovers 6 (new) transient execution attacks that have been overlooked and not been investigated so far: 2 new exploitable Meltdown effects: Meltdown-PK (Protection Key Bypass) on Intel, and Meltdown-BND (Bounds Check Bypass) on Intel and AMD; and 4 new Spectre mistraining strategies. We evaluate the attacks in our classification tree through proof-of-concept implementations on 3 major CPU vendors (Intel, AMD, ARM). Our systematization yields a more complete picture of the attack surface and allows for a more systematic evaluation of defenses. Through this systematic evaluation, we discover that most defenses, including deployed ones, cannot fully mitigate all attack variants

    COVID-19-associated Guillain-Barré syndrome in the early pandemic experience in Lombardia (Italy)

    Get PDF
    Objective To estimate the incidence and describe clinical characteristics and outcome of GBS in COVID-19 patients (COVID19-GBS) in one of the most hit regions during the frst pandemic wave, Lombardia. Methods Adult patients admitted to 20 Neurological Units between 1/3–30/4/2020 with COVID19-GBS were included as part of a multi-center study organized by the Italian society of Hospital Neuroscience (SNO). Results Thirty-eight COVID19-GBS patients had a mean age of 60.7 years and male frequency of 86.8%. CSF albuminocytological dissociation was detected in 71.4%, and PCR for SARS-CoV-2 was negative in 19 tested patients. Based on neurophysiology, 81.8% of patients had a diagnosis of AIDP, 12.1% of AMSAN, and 6.1% of AMAN. The course was favorable in 76.3% of patients, stable in 10.5%, while 13.2% worsened, of which 3 died. The estimated occurrence rate in Lombardia ranges from 0.5 to 0.05 GBS cases per 1000 COVID-19 infections depending on whether you consider positive cases or estimated seropositive cases. When we compared GBS cases with the pre-pandemic period, we found a reduction of cases from 165 to 135 cases in the 2-month study period in Lombardia. Conclusions We detected an increased incidence of GBS in COVID-19 patients which can refect a higher risk of GBS in COVID-19 patients and a reduction of GBS events during the pandemic period possibly due to a lower spread of more common respiratory infectious diseases determined by an increased use of preventive measures

    La terra \ue8 bassa (ma noi voliamo altissimi)

    No full text
    Questo mese riflettori accesi sui droni agricoli a Bari, e precisamente alla fiera AgriLevante, la pi\uf9 importante manifestazione agricola del bacino del Mediterraneo, dove i droni sono ospitati in una esposizione collettiva organizzata da Dronitaly in collaborazione con FederUnacoma. Ma qual \ue8 la realt\ue0 dei droni \u201cverdi\u201d italiani? Ce lo raccontano gli esperti di Neos, spinoff dell\u2019Universit\ue0 di Padova che opera nell\u2019ambito dei rilevamenti da drone a uso agricolo e forestal
    corecore