Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Elena Reshetova is active.

Publication


Featured researches published by Elena Reshetova.


nordic conference on secure it systems | 2014

Security of OS-Level Virtualization Technologies

Elena Reshetova; Janne Karhunen; Thomas Nyman; N. Asokan

The need for flexible, low-overhead virtualization is evident on The need for flexible, low-overhead virtualization is evident on many fronts ranging from high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study of OS-level virtualization from the point of view of security. In this paper, we conduct a comparative study of several OSlevel virtualization systems, discuss their security and identify some gaps in current solutions.


applied cryptography and network security | 2013

CrowdShare: secure mobile resource sharing

N. Asokan; Alexandra Dmitrienko; Marcin Nagy; Elena Reshetova; Ahmad-Reza Sadeghi; Thomas Schneider; Stanislaus Stelle

Mobile smart devices and services have become an integral part of our daily life. In this context there are many compelling scenarios for mobile device users to share resources. A popular example is tethering. However, sharing resources also raises privacy and security issues. In this paper, we present CrowdShare, a complete framework and its (Android) implementation for secure and private resource sharing among nearby devices. CrowdShare provides pseudonymity for users, accountability of resource usage, and the possibility of specifying access control in terms of social network relationships. Further, CrowdShare preserves secure connectivity between nearby devices even in the absence of the mobile infrastructure. We have implemented CrowdShare on Android devices and report good performance results.


international conference on information systems security | 2017

SELint: an SEAndroid policy analysis tool

Elena Reshetova; Filippo Bonazzi; N. Asokan

SEAndroid enforcement is now mandatory for Android devices. In order to provide the desired level of security for their products, Android OEMs need to be able to minimize their mistakes in writing SEAndroid policies. However, existing SEAndroid and SELinux tools are not very useful for this purpose. It has been shown that SEAndroid policies found in commercially available devices for multiple manufacturers contain mistakes and redundancies. In this paper we present a new tool, SELint, which aims to help OEMs to produce better SEAndroid policies. SELint is extensible and configurable to suit the needs of different OEMs. It is provided with a default configuration based on the AOSP SEAndroid policy, but can be customized by OEMs.


international conference on information systems security | 2016

Characterizing SEAndroid Policies in the Wild

Elena Reshetova; Filippo Bonazzi; Thomas Nyman; Ravishankar Borgaonkar; N. Asokan

Starting from the 5.0 Lollipop release all Android processes must be run inside confined SEAndroid access control domains. As a result, Android device manufacturers were compelled to develop SEAndroid expertise in order to create policies for their device-specific components. In this paper we analyse SEAndroid policies from a number of 5.0 Lollipop devices on the market, and identify patterns of common problems we found. We also suggest some practical tools that can improve policy design and analysis. We implemented the first of such tools, SEAL.


Software - Practice and Experience | 2018

Toward Linux kernel memory safety: Toward Linux kernel memory safety

Elena Reshetova; Hans Liljestrand; Andrew Paverd; N. Asokan

The security of billions of devices worldwide depends on the security and robustness of the mainline Linux kernel. However, the increasing number of kernel‐specific vulnerabilities, especially memory safety vulnerabilities, shows that the kernel is a popular and practically exploitable target. Two major causes of memory safety vulnerabilities are reference counter overflows (temporal memory errors) and lack of pointer bounds checking (spatial memory errors). To succeed in practice, security mechanisms for critical systems like the Linux kernel must also consider performance and deployability as critical design objectives. We present and systematically analyze two such mechanisms for improving memory safety in the Linux kernel, ie, (1) an overflow‐resistant reference counter data structure designed to securely accommodate typical reference counter usage in kernel source code and (2) runtime pointer bounds checking using Intel memory protection extension in the kernel. We have implemented both mechanisms and we analyze their security, performance, and deployability. We also reflect on our experience of engaging with Linux kernel developers and successfully integrating the new reference counter data structure into the mainline Linux kernel.


network and system security | 2017

Randomization Can’t Stop BPF JIT Spray

Elena Reshetova; Filippo Bonazzi; N. Asokan

The Linux kernel Berkeley Packet Filter (BPF) and its Just-In-Time (JIT) compiler are actively used in various pieces of networking equipment where filtering speed is especially important. In 2012, the Linux BPF/JIT compiler was shown to be vulnerable to a JIT spray attack; fixes were quickly merged into the Linux kernel in order to stop the attack. In this paper we show two modifications of the original attack which still succeed on a modern 4.4 Linux kernel, and demonstrate that JIT spray is still a major problem for the Linux BPF/JIT compiler. This work helped to make the case for further and proper countermeasures to the attack, which have then been merged into the 4.7 Linux kernel.


conference on data and application security and privacy | 2011

Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures

Kari Kostiainen; Elena Reshetova; Jan-Erik Ekberg; N. Asokan


Archive | 2008

Method, apparatus and computer program product for providing object privilege modification

Jan-Erik Ekberg; Elena Reshetova


Synthesis Lectures on Information Security, Privacy, and Trust | 2014

Mobile Platform Security

N. Asokan; Lucas Davi; Alexandra Dmitrienko; Stephan Heuser; Kari Kostiainen; Elena Reshetova; Ahmad-Reza Sadeghi


arXiv: Cryptography and Security | 2014

Security of OS-level virtualization technologies: Technical report.

Elena Reshetova; Janne Karhunen; Thomas Nyman; N. Asokan

Collaboration


Dive into the Elena Reshetova's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ahmad-Reza Sadeghi

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge