Differences

This shows you the differences between two versions of the page.

Link to this comparison view

ass:cursuri:03 [2023/07/06 17:28]
127.0.0.1 external edit
ass:cursuri:03 [2023/07/24 13:49] (current)
radu.mantu
Line 1: Line 1:
-==== Cursul ​03 ====+~~NOTOC~~ 
 + 
 +===== 03 - Trusted Execution ​ ====
 + 
 +<​html>​ 
 +<iframe src="​https://​docs.google.com/​presentation/​d/​e/​2PACX-1vQK15sNhmdh7UtBDOHEtdvOHDX9exq6VXGMrj--gxSWj3Krv7WUPPupIwzxyZMnLJQdOjtT2WnWgDke/​embed?​start=false&​loop=false"​ frameborder="​0"​ width="​800"​ height="​486"​ allowfullscreen="​true"​ mozallowfullscreen="​true"​ webkitallowfullscreen="​true"></​iframe>​ 
 +</​html>​ 
 + 
 +===== Contents ===== 
 + 
 +{{indexmenu>:​ass:​cursuri:​03:​theory|skipfile}} 
 + 
 +===== Lecture Notes ===== 
 + 
 +In the cyber security landscape, as you well know, any piece of software may contain various security vulnerabilities (usually, due to its developers'​ negligence),​ which may allow a malicious entity to obtain execution privileges on the device. 
 + 
 +Though the hacker might gain limited permissions at first (due to the application running as an unprivileged user), a computer bug is never alone in a system and, ultimately, the attacker may be able to circumvent such restrictions by doing (and chaining) additional privilege escalation exploits. 
 +The ideal end-game would be to obtain kernel-level execution rights and inject a hidden persistent malware to covertly keep the device under malicious control (e.g., for financial / political gains). 
 + 
 +Increased complexity often encountered in modern software is regarded as the primary reason for the apparition of bugs, since having a many number of lines of code makes any verification process considerably harder. 
 +Due to this, modern security practices recommend organizing the system'​s architecture into smaller, standalone components, thus ensuring better security properties and overall good quality of a software (also see: [[https://​en.wikipedia.org/​wiki/​Unix_philosophy|Unix Philosophy]]). 
 + 
 +From here, we can go even further: some parts of a system might be more security-critical than others (cyber-physical interfaces, databases storing sensitive secrets etc.); modern hardware might allow us to ensure additional protections for these such that, even when the Operating System kernel gets breached, an attacker'​s access remains confined by the processor and it won't be able to cause system-wide mayhem. 
 +Enter **Trusted Execution Environments**! 
 + 
 +{{namespace>:​ass:​cursuri:​03:​theory&​nofooter&​noeditbutton}}
  
ass/cursuri/03.1688653710.txt.gz · Last modified: 2023/07/16 10:05 (external edit)
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0