data https://ece.sitemasonry.gmu.edu/ en Two papers gain recognition in the hardware security field https://ece.sitemasonry.gmu.edu/news/2022-02/two-papers-gain-recognition-hardware-security-field <span>Two papers gain recognition in the hardware security field</span> <span><span lang="" about="/user/401" typeof="schema:Person" property="schema:name" datatype="">Rena Malai</span></span> <span>Fri, 02/25/2022 - 14:28</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class='field__items'> <div class="field__item"><a href="/profiles/kkhasawn" hreflang="und">Khaled Khasawneh</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq261/files/styles/small_content_image/public/2022-02/Khaled%20photo.jpg?itok=1dVIavxO" width="350" height="322" alt="Khaled and Benham" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption><em>Khaled N. Khasawneh (at right), assistant<br /> professor in the Electrical and Computer Engineering Department, works alongside PHD student Behnam Omidi.</em></figcaption></figure><p><span><span><span><span><span><span><span><span>Khaled N. Khasawneh, assistant professor in the Electrical and Computer Engineering <span>Department at George Mason University, contributed significant research and work to two papers which have been recognized in the area of hardware security.</span></span></span></span></span></span></span></span></span></p> <p><strong><span><span><span><span><span><span><span><em><span><span>Researchers in Khasawneh’s CAMLsec Lab Identified a New Vulnerability in the Cloud Scheduler </span></span></em></span></span></span></span></span></span></span></strong></p> <p><span><span><span><span><span><span><span><span><span>A paper entitled </span></span><a href="https://arxiv.org/abs/2110.00846"><span>“<em>Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks”</em></span></a><span><span> was written as part of a collaborative research effort with University of California (UC)- Davis and George Mason University. Along with his collaborators at UC Davis, Khasawneh helped to discover a new vulnerability in cloud schedulers, which could inadvertently allow targeted micro-architectural attacks in the cloud. </span></span></span></span></span></span></span></span></span><span><span><span><span><span><span><span><span><span>This paper pointed out that certain features in the cloud scheduler enables arbitrary users to influence scheduling results. This can help attackers co-locate attacker’s code with a targeted victim’s code in a heterogeneous cloud, which enables a wide variety of micro-architectural attacks that leak sensitive data. </span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>“The current design of scheduling algorithms in the cloud focuses on enhancing workloads performance, resource utilization, and load-balancing without security considerations, which may bring new vulnerability as we showed in our work,” says Khasawneh. </span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>The paper is accepted for publication at the 2022 Network and Distributed System Security Symposium (NDSS), and will be presented there in April.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>This paper is co-authored with Behnam Omidi, a second year PHD student within the Electrical and Computer Engineering Department. His research focuses on discovering systems vulnerabilities and hardware support to secure computing systems. </span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>Khasawneh—Omidi’s advisor-- says this paper was a great opportunity to gain useful knowledge as it was a tremendous collaborative effort between both schools.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>“I’m more of an expert in microarchitecral attacks, and our co-collaborators at UC Davis, led by Dr. Homayoun, brings expertise of cloud computing and resource scheduling,” says Khasawneh.</span></span></span></span></span></span></span></span></p> <p><strong><span><span><span><span><span><span><span><em><span>Khasawneh’s Paper Selected as a Top Pick in </span></em><em><span><span>Architecture and Hardware Security 2021</span></span></em></span></span></span></span></span></span></span></strong></p> <p><span><span><span><span><span><span><span><span>A paper co-authored by Khasawneh </span><span>was selected as a </span><a href="https://www.ieee-hsttc.org/top-picks/"><span>Top Pick in Architecture and Hardware Security 2021.</span></a></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span><span>The top picks in architecture and embedded security represent the top and most impactful papers that have been published in the area in the last six years, from 2015 to 2020. Top picks are selected from conference papers that have appeared in leading hardware security conferences including but not limited to DAC, ICCAD, DATE, ASPDAC, HOST, Asian HOST, GLSVLSI, VLSI Design, CHES, ETS, VTS, ITC, S&amp;P, Usenix Security, CCS, NDSS, ISCA, MICRO, ASPLOS, HPCA, HASP, ACSAC, Euro S&amp;P, and Asia CCS.</span></span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>The top pick paper is titled “</span><a href="https://www.usenix.org/system/files/conference/woot18/woot18-paper-koruyeh.pdf"><em>Spectre Returns! Speculation Attacks using the Return Stack Buffer</em></a><em> </em><span>” and had previously won the best paper award in the USENIX Workshop on Offensive Technologies (WOOT) in 2018. This paper </span><span><span>discovers a new class of Spectre attack, called SpectreRSB, that exploits the return stack buffer (</span></span><a href="https://stackoverflow.com/questions/13722935/return-stack-buffer#comment18872475_13722935" target="_blank"><span>RSB</span></a><span><span>), which is used in modern CPUs to help predict return addresses, instead of the branch predictor unit. SpectreRSB</span></span> <span><span>allows malicious software to steal passwords, keys, and other sensitive information, from memory it shouldn't be allowed to touch.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>According to Khasawneh, Linux kernel released a </span><a href="http://lkml.iu.edu/hypermail/linux/kernel/1807.3/00872.html">patch</a><span> to protect against SpectreRSB vulnerability (</span><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-15572#vulnCurrentDescriptionTitle">CVE-2018-15572</a><span>). </span></span></span></span></span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/731" hreflang="en">grants</a></div> <div class="field__item"><a href="/taxonomy/term/286" hreflang="en">Department of Electrical and Computer Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/661" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/736" hreflang="en">data</a></div> <div class="field__item"><a href="/taxonomy/term/1246" hreflang="en">C-TASC</a></div> </div> </div> </div> </div> </div> Fri, 25 Feb 2022 19:28:12 +0000 Rena Malai 676 at https://ece.sitemasonry.gmu.edu