Title :
Enhance OS security by restricting privileges of vulnerable application
Author :
Shukla, Himanshu ; Singh, V. ; Young-Ho Choi ; JaeOok Kwon ; Cheul-hee Hahm
Author_Institution :
Syst. S/W, Samsung Res. Inst. - Delhi, Noida, India
Abstract :
Restricting vulnerable process and its file I/O behaviors is important for securing an embedded device against intrusions, malware infection and information leakage. On embedded device like Smart TV, user can connect to internet using Web Browser process and can download many applications and games. These applications or games may have viruses or vulnerable code. If attacker with root privilege is able to launch new process (using fork () in Linux system) then the downloaded virus program will also get root privileges and hence vulnerable application with root user privileges may corrupt the whole system. This paper proposes a new method to protect the system from this kind of security threats. For experiment and result verification, proposed method uses LSM framework and TOMOYO module. It implements the LSM hook in fork/exec system call path to control the privileges of vulnerable application/binary. Android addresses this problem by writing a wrapper to fork system call in their framework, which modifies credential of new process. However they leave security hole, if application directly calls fork () system call.
Keywords :
Linux; computer crime; computer viruses; embedded systems; Android; Internet; LSM framework; LSM hook; Linux system; OS security; Smart TV; TOMOYO module; Web browser process; attacker; downloaded virus program; embedded device security; file I/O behaviors; fork/exec system call path; information leakage; intrusions; malware infection; privileges restriction; root user privileges; security hole; security threats; system protection; vulnerable application; vulnerable code; Access control; Androids; Databases; Humanoid robots; Kernel; Linux; Android; DAC; LSM; MAC; Privilege; Security; Security Policy; TOMOYO;
Conference_Titel :
Consumer Electronics (GCCE), 2013 IEEE 2nd Global Conference on
Conference_Location :
Tokyo
Print_ISBN :
978-1-4799-0890-5
DOI :
10.1109/GCCE.2013.6664800