Property-based Integrity Monitoring of Operating System Kernels

نویسندگان

  • Nick Louis Petroni
  • Michael Hicks
  • Jeffrey Hollingsworth
چکیده

Title of dissertation: PROPERTY-BASED INTEGRITY MONITORING OF OPERATING SYSTEM KERNELS Nick Louis Petroni, Jr. Doctor of Philosophy, 2008 Dissertation directed by: Assistant Professor Michael Hicks Department of Computer Science As the foundation of the trusted computing base, the operating system kernel is a valuable target for attackers of a computer system seeking maximum control and privilege. Furthermore, because the majority of modern security solutions rely on the correctness of at least some portion of the operating system kernel, skilled attackers who successfully infiltrate kernel memory can remain undetected indefinitely. In this dissertation, we present an approach for detecting attacks against the kernel’s integrity (commonly referred to as “rootkits”). Our approach, which we call property-based integrity monitoring, works by monitoring and analyzing the kernel’s state at runtime. Unlike traditional security solutions, our monitor operates in isolation of, and independently from, the protected operating system and has direct access to the kernel’s runtime state. The basic strategy behind property-based monitoring is to identify a set of properties that are practical to check, yet are effective at detecting the types of changes an attacker might make — both known and yet-to-be-discovered. In this work, we describe a practical and effective property for detecting persistent controlflow modifications in running kernels, called state-based control-flow integrity (SBCFI). Furthermore, to address those data-only attacks that do not violate the kernel’s control-flow, we introduce a high-level policy language system for enforcing semantic integrity constraints in runtime kernel data. To evaluate the feasibility and effectiveness of our system, we have implemented two property-based integrity monitors for the Linux kernel — one using a virtual machine monitor and the other using a PCI-based coprocessor. We demonstrate that property-based monitoring is capable of detecting all publicly-available kernel integrity threats while imposing less than 1% overhead on the protected system. We conclude that property-based kernel integrity monitoring can be both practical and effective. PROPERTY-BASED INTEGRITY MONITORING OF OPERATING SYSTEM KERNELS

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions

Kernel extensions are widely used by attackers to compromise the operating system kernel. With the presence of various untrusted extensions, it remains a challenging problem to comprehensively preserve the integrity of OS kernels in a practical and generic way. In this paper, we present HUKO, a hypervisor-based integrity protection system designed to protect commodity OS kernels from untrusted ...

متن کامل

Kernel Data Integrity Protection via Memory Access Control

Operating system kernels isolate applications from other malicious software via protected memory created by virtual memory management. Even though modern kernels aggregate core kernel code with driver and module components of different provenance, kernel memory remains unified and without isolation. Kernel-level malicious software has full access to the data and operations of all kernel compone...

متن کامل

Resource-Aware Stream Management with the Customizable dproc Distributed Monitoring Mechanisms

Monitoring the resources of distributed systems is essential to the successful deployment and execution of grid applications, particularly when such applications have welldefined QoS requirements. The dproc system-level monitoring mechanisms implemented for standard Linux kernels have several key components. First, utilizing the familiar /proc filesystem, dproc extends this interface with resou...

متن کامل

Complete Nevanlinna-Pick Kernels

We give a new treatment of Quiggin’s and McCullough’s characterization of complete Nevanlinna-Pick kernels. We show that a kernel has the matrix-valued NevanlinnaPick property if and only if it has the vector-valued Nevanlinna-Pick property. We give a representation of all complete Nevanlinna-Pick kernels, and show that they are all restrictions of a universal complete Nevanlinna-Pick kernel.

متن کامل

Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection

With the introduction of kernel integrity checking mechanisms in modern operating systems, such as PatchGuard on Windows OS, malware developers can no longer easily install stealthy hooks in kernel code and well-known data structures. Instead, they must target other areas of the kernel, such as the heap, which stores a large number of function pointers that are potentially prone to malicious ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008