Title :
Detecting exploit code execution in loadable kernel modules
Author :
Xu, Haizhi ; Du, Wenliang ; Chapin, Steve J.
Author_Institution :
Syst. Assurance Inst., Syracuse Univ., NY, USA
Abstract :
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-module exploitation can jeopardize the integrity of the entire system. In this paper, we analyze the threat that comes from the implicit trust relationship between the operating system kernel and loadable kernel modules. We then present a specification-directed access monitoring tool - HECK, that detects kernel modules for malicious code execution. Inside the module, HECK prevents code execution on the kernel stack and the data sections; on the boundary, HECK restricts the module´s access to only those kernel resources necessary for the module´s operation. Our measurements show that our tool incurs 5-23% overhead on some I/O intensive applications using these modules.
Keywords :
formal specification; operating system kernels; program compilers; security of data; system monitoring; HECK; code execution; kernel-module exploitation; loadable kernel modules; monolithic operating systems; specification-directed access monitoring tool; Computer bugs; Data security; Educational institutions; File systems; Hardware; Kernel; Linux; Monitoring; Operating systems; Protection;
Conference_Titel :
Computer Security Applications Conference, 2004. 20th Annual
Print_ISBN :
0-7695-2252-1
DOI :
10.1109/CSAC.2004.18