首页> 外文期刊>Software >A policy-centric approach to protecting OS kernel from vulnerable LKMs
【24h】

A policy-centric approach to protecting OS kernel from vulnerable LKMs

机译:以策略为中心的方法来保护OS内核免受易受攻击的LKM

获取原文
获取原文并翻译 | 示例
           

摘要

Loadable kernel modules (LKMs) that contain vulnerabilities are a big threat to modern operating systems (OSs). The primary reason is that there is no protection mechanism inside the kernel space when the LKM is executed. As a result, kernel module exploitation can seriously affect the OS kernel security. Although many protection systems have been developed to address this problem in the past few years, there still remain some challenges: (1) How to automatically generate a security policy before the kernel module is enforced? (2) How to properly mediate the interactions between the kernel module and the OS kernel without modifications on the existing OS, hardware, and kernel module structure? To address these challenges, we present LKM guard (LKMG), a policy-centric system that can protect commodity OS kernel from vulnerable LKMs. Compared with previous systems, LKMG is able to generate a security policy from a kernel module and then enforce the policy during the run time. Generally, the working process of LKMG can be divided into 2 stages. First, we utilize static analysis to extract the kernel code and data access patterns from a kernel module's source code and then combine these patterns with the related memory address information to generate a security policy. Second, by leveraging the hardware-assisted virtualization technology, LKMG isolates the kernel module from the rest of the kernel and then enforces the kernel module's execution to obey the derived policy. The experiments show that our system can defend against various attacks launched by the compromised kernel module effectively with moderate performance cost.
机译:包含漏洞的可加载内核模块(LKM)对现代操作系统(OS)构成了巨大威胁。主要原因是执行LKM时内核空间内没有保护机制。结果,内核模块的利用会严重影响OS内核的安全性。尽管在过去几年中已经开发出许多保护系统来解决此问题,但仍然存在一些挑战:(1)如何在强制执行内核模块之前自动生成安全策略? (2)如何在不修改现有操作系统,硬件和内核模块结构的情况下正确调解内核模块与操作系统内核之间的交互?为了应对这些挑战,我们提出了LKM Guard(LKMG),这是一个以策略为中心的系统,可以保护商品OS内核免受易受攻击的LKM的侵害。与以前的系统相比,LKMG能够从内核模块生成安全策略,然后在运行时实施该策略。通常,LKMG的工作过程可以分为两个阶段。首先,我们利用静态分析从内核模块的源代码中提取内核代码和数据访问模式,然后将这些模式与相关的内存地址信息结合起来以生成安全策略。其次,通过利用硬件辅助的虚拟化技术,LKMG将内核模块与内核的其余部分隔离开,然后强制执行内核模块以遵守派生的策略。实验表明,我们的系统可以以适度的性能成本有效地抵御受感染内核模块发起的各种攻击。

著录项

  • 来源
    《Software》 |2018年第6期|1269-1284|共16页
  • 作者单位

    Beijing Inst Technol, Beijing Key Lab Software Secur Engn Tech, Beijing 100081, Peoples R China;

    Facebook Inc, Menlo Pk, CA 94025 USA;

    Beijing Inst Technol, Beijing Key Lab Software Secur Engn Tech, Beijing 100081, Peoples R China;

    Penn State Univ, University Pk, PA 16802 USA;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    OS kernel protection; static analysis; virtualization;

    机译:操作系统内核保护;静态分析;虚拟化;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号