SERENA FERRACCI

Dottoressa di ricerca

ciclo: XXXV


supervisore: Leonardo Querzoni

Titolo della tesi: Beefing Up Security: Low-Overhead Resources for High-Performance Protection

In today's world, where technology is evolving at an unprecedented pace, it's increasingly important to protect computer systems and applications from attacks. Side-channel and control hijacking attacks are two of the most dangerous types of attacks that a system can face. The former can extract sensitive information from a system by analysing its physical properties, while the latter can take over a program's control flow and lead to unauthorised execution of malicious code. These attacks can have severe consequences, ranging from the exposure of confidential data to the compromise of the entire system. It is critical to develop methods to prevent and mitigate side-channel and control hijacking attacks. However, any mitigation technique must balance the need for security with the need for efficient system performance. An overly intrusive or resource-intensive mitigation can lead to reduced system performance and can even make the system more vulnerable to attacks. This is also particularly important in high-performance computing environments, where system performance is essential, and any reduction in performance can have significant consequences. The purpose of this thesis is to study the solutions that currently exist to defend against side-channel and control hijacking attacks and to improve upon them using hardware supports. Hardware supports are already available within the machine and are implemented at the firmware level, making them transparent and low-overhead. They were originally designed to monitor an application or system from a performance perspective, but they have interesting characteristics that make them suitable for detecting attacks in progress. The adaptation of hardware supports for attack detection was made possible by identifying the specific behavior of each program during its execution through its performance. Each operation requires specific resources and uses different software and hardware components, leaving a specific \texttt{footprint} during its execution. Once the configuration of the program's footprint was established, it was possible to understand how to exploit the information produced by hardware supports to detect the execution of an attack. The approach taken in this thesis is to develop a new hardware-based mitigation technique that utilises hardware supports to detect and prevent side-channel and control hijacking attacks. The proposed technique is efficient and effective, striking the right balance between security and system performance. The technique has been evaluated using a range of benchmarks and real-world applications, demonstrating its ability to detect and prevent attacks while imposing minimal overhead on system performance. The results of this study show that hardware-based mitigation techniques can be highly effective in protecting computer systems and applications from side-channel and control hijacking attacks. The use of hardware supports to detect and prevent these attacks is a promising approach that can offer significant advantages over existing software-based mitigation techniques.

Produzione scientifica

11573/1652448 - 2022 - Fight Hardware with Hardware: System-wide Detection and Mitigation of Side-Channel Attacks using Performance Counters
Carna', Stefano; Ferracci, Serena; Quaglia, Francesco; Pellegrini, Alessandro - 01a Articolo in rivista
rivista: DIGITAL THREATS (New York NY: Association for Computing Machinery, [2020]-) pp. - - issn: 2692-1626 - wos: (0) - scopus: 2-s2.0-85152897415 (2)

11573/1614947 - 2021 - Static analysis of PE files using neural network techniques for a pocket tool
Fonseca A, F. H.; Ferracci, S.; Palmaro, F.; Iocchi, L.; Nardi, D.; Franchina, L. - 04b Atto di convegno in volume
congresso: 2021 IEEE International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2021 (Flic en Flac; Mauritius)
libro: 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) - (978-1-6654-1262-9)

11573/1614953 - 2021 - Detecting phishing e-mails using text mining and features analysis
Franchina, L.; Ferracci, S.; Palmaro, F. - 04b Atto di convegno in volume
congresso: 5th Italian Conference on Cybersecurity, ITASEC 2021 (Online Conference)
libro: ITASEC 2021 Italian Conference on Cybersecurity 2021 - ()

11573/1487750 - 2020 - Don’t be Paranoid: Dynamic Detection and Mitigation for Threats Exploiting Cache-based Side-channel Attacks
Carna', Stefano; Ferracci, Serena; Quaglia, Francesco; Pellegrini, Alessandro - 02a Capitolo o Articolo
libro: ACACES 2020, Poster Abstracts - (9789078427001)

11573/1349056 - 2019 - Hardware-assisted Incremental Checkpointing in Speculative Parallel Discrete Event Simulation
Carna', Stefano; Ferracci, Serena; De Santis, Emanuele; Pellegrini, Alessandro; Quaglia, Francesco - 04b Atto di convegno in volume
congresso: 2019 Winter Simulation Conference, WSC 2019 (National Harbor; United States)
libro: 2019 Winter Simulation Conference (WSC) - (978-1-7281-3283-9)

11573/1282978 - 2018 - ROPMate: Visually Assisting the Creation of ROP-based Exploits
Angelini, Marco; Blasilli, Graziano; Borrello, Pietro; Coppa, Emilio; D'elia, Daniele Cono; Ferracci, Serena; Lenti, Simone; Santucci, Giuseppe - 04b Atto di convegno in volume
congresso: 15th IEEE Symposium on Visualization for Cyber Security (Berlin; Germany)
libro: 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) - (978-153868194-7)

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma