Please use this identifier to cite or link to this item:
http://hdl.handle.net/10609/118506
Title: | Hacking the running Linux kernel |
Author: | Armas Castro, Leoncio |
Director: | Garcia-Font, Victor |
Tutor: | Méndez Muñoz, Víctor |
Abstract: | Linux is the most used kernel in embedded systems, devices whose public availability makes the kernel the critical point of many of the integrated security systems (firmware validation, passwords, encryption seeds, hardware roots, etc.). Different board setups are susceptible to hot RAM read attacks, either on SCI bus (JTAG BusPirate type attacks) or RAM buses connected to the CPU (attacks with electronic Logic Analyzer Module). In this paper, the different tools and techniques used in the analysis of memory dumps will be analyzed. These tools are widely used to know that they were running on the device at the time of information capture. Subsequently, to evaluate the different tools using a memory dump sample, information will be obtained on the device from which the sample was obtained. |
Keywords: | kernel Linux RAM |
Document type: | info:eu-repo/semantics/masterThesis |
Issue Date: | 2-Jun-2020 |
Publication license: | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
Appears in Collections: | Trabajos finales de carrera, trabajos de investigación, etc. |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
larmascTFM0620memoria.pdf | Memoria del TFM | 2,03 MB | Adobe PDF | View/Open |
Share:
This item is licensed under a Creative Commons License