The case for legacy software
Florian Pester

The case for legacy software

Physical Infrastructure in the real-world has a much longer lifetime than software systems. This presents a number of challenges to operators: Hardware components fail at some point while spare parts are no longer available and need to be replaced by modern alternatives. Old software lacks support for modern components and a major software upgrade is required for continuing operation. Learn how this gap can be mediated and what can be done to solve this issue long-term.

  • legacy
  • legacy-software
  • windows-7
  • kronocore
  • long-term-support
  • linux
Student Thesis: A Policy-Free System-Call Layer for the Hedron Microhypervisor
Philipp Schuster

Student Thesis: A Policy-Free System-Call Layer for the Hedron Microhypervisor

The thesis presents modifications to Hedron and an associated runtime system. Together, these components enable the concurrent execution of Hedron-native applications and unmodified foreign applications using Linux programs as an example. This allows to reuse the established toolchains and developing new software for Hedron with them. Furthermore, Linux programs are supported that contain additionally Hedron-native system calls. I call them hybrid applications. This mechanism enables to communicate directly with interfaces of Hedron's runtime environment from foreign applications.

  • virtualization
  • thesis
Cyberus Technology Gives Keynote at Symposium on the Science of Security (HotSoS)
Werner Haas

Cyberus Technology Gives Keynote at Symposium on the Science of Security (HotSoS)

HoTSoS identifies itself as research event centered on the Science of Security, which aims to address the fundamental problems of security in a principled manner. Because the seminal Spectre paper won NSA's Best Scientific Cybersecurity Paper Competition last year, its authors were invited to give a keynote speech at the symposium. Given that the corresponding vulnerabilities were disclosed to Intel almost 4 years ago, we (the authors) decided to take a step back and to look, in HotSoS' spirit, at the fundamental problems. We (Cyberus Technology) feel deeply honoured that we were entrusted with delivering the talk and want to give you a sneak preview of what to expect.

  • side-channels
  • security
  • talks
Florian Pester, Jacek Galowicz, Julian Stecklina

TSX Asynchronous Abort

Today a new variant of the ZombieLoad family of side-channel attacks has been made public. This new variant is called TSX Asynchronous Abort (TAA). TAA works on all recent Intel processors that support Intel TSX, including Intel's most recent Cascade Lake processors.

  • side-channels
  • security
Werner Haas

Bygone, forgotten, over? One year after Meltdown of processor security

About a year ago, I (together with a small team of other security researchers) was waiting for Intel to disclose security vulnerabilities we had discovered in its microprocessor hardware. We expected a fair bit of excitement because the industry had been scrambling to get mitigations in place. However I was thoroughly gobsmacked by the kind of delayed fireworks unfolding in the media. More than a year has elapsed since then so it is only fair to ask what is left beyond the sound and smoke - and why it was not the beginning of the end of the familiar IT universe, as predicted by a couple of pessimists.

  • side-channels
  • security

Reach out to us

Have questions? Feel free to contact us using the form below. We're here to help!