Hades∗: Scanning Kernel Extensions to Trust the Untrustworthy

ثبت نشده
چکیده

Modern monolithic OSes leverage the loadable kernel module paradigm to add functionality to the kernel and allow a system to communicate with an increasing number of I/O devices. This paradigm is convenient as OS designers can outsource extra functionality to third parties and keep the original kernel from growing too large. On the other hand, this paradigm represents an avenue for exploitation as extensions become part of the kernel. Proposed kernel defense and driver containment solutions have not been widely deployed mostly because they require custom kernels and/or hypervisors. This paper proposes a practical solution to guide a system administrator in the challenging task of trusting the untrustworthy: a VM-based tool, Hades, which performs a fine-grained scan of module’s execution with the generation of a report file. Hades assumes the non-enforced kernel security policy that extensions should only interact with the kernel through a set of exported functions. It determines whether a module accesses a kernel data structure (static or dynamic), its name, type of access and also which non-exported functions were accessed. Experimental results with 14 benign modules and drivers and 7 rootkits show that even some benign extensions attempt to circumvent the kernel exported interface, and the vast majority of rootkits need to tamper with kernel data structures and invoke non-exported functions. Hades incurs negligible overhead to the guest OS (less than 2%) and a 1.25X slowdown to the VM, which is acceptable for an offline tool.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AHP Techniques for Trust Evaluation in Semantic Web

The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...

متن کامل

AHP Techniques for Trust Evaluation in Semantic Web

The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...

متن کامل

Developmental trajectories of cortical-subcortical interactions underlying the evaluation of trust in adolescence.

Social decision making is guided by the ability to intuitively judge personal attributes, including analysis of facial features to infer the trustworthiness of others. Although the neural basis for trustworthiness evaluation is well characterized in adults, less is known about its development during adolescence. We used event-related functional magnetic resonance imaging to examine age-related ...

متن کامل

Auctions with Untrustworthy Bidders

The paper analyzes auctions which are not completely enforceable. In such auctions, the winning bidders may fail to carry out their obligations, and parties involved cannot rely on external enforcement or control mechanisms for backing up a transaction. We propose two mechanisms that make bidders directly or indirectly reveal their trustworthiness. The first mechanism is based on discriminating...

متن کامل

Trust Revelation in Multiagent Interaction

We analyze untrustworthy interactions, that is, interactions in which a party may fail to carry out its obligations. Such interactions pose agents with the problem of how to estimate the trustworthiness of the other party. The efficiency of untrustworthy interactions critically depends on the amount and the nature of information about untrustworthy agents. We propose a solution to the problem o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013