DocumentCode :
2274077
Title :
Detecting exploit code execution in loadable kernel modules
Author :
Xu, Haizhi ; Du, Wenliang ; Chapin, Steve J.
Author_Institution :
Syst. Assurance Inst., Syracuse Univ., NY, USA
fYear :
2004
fDate :
6-10 Dec. 2004
Firstpage :
101
Lastpage :
110
Abstract :
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-module exploitation can jeopardize the integrity of the entire system. In this paper, we analyze the threat that comes from the implicit trust relationship between the operating system kernel and loadable kernel modules. We then present a specification-directed access monitoring tool - HECK, that detects kernel modules for malicious code execution. Inside the module, HECK prevents code execution on the kernel stack and the data sections; on the boundary, HECK restricts the module´s access to only those kernel resources necessary for the module´s operation. Our measurements show that our tool incurs 5-23% overhead on some I/O intensive applications using these modules.
Keywords :
formal specification; operating system kernels; program compilers; security of data; system monitoring; HECK; code execution; kernel-module exploitation; loadable kernel modules; monolithic operating systems; specification-directed access monitoring tool; Computer bugs; Data security; Educational institutions; File systems; Hardware; Kernel; Linux; Monitoring; Operating systems; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2004. 20th Annual
ISSN :
1063-9527
Print_ISBN :
0-7695-2252-1
Type :
conf
DOI :
10.1109/CSAC.2004.18
Filename :
1377220
Link To Document :
بازگشت