Linux Provenance Modules: Secure Provenance Collection for the Linux Kernel
نویسندگان
چکیده
In spite of a growing interest in provenance-aware systems, mechanisms for automated provenance collection have failed to win acceptance in mainstream operating systems. This is due in part to a lack of consensus within disparate provenance development communities on a single general solution – provenance collection mechanisms have been proposed at a variety of operational layers wthin host systems, collecting metadata at a variety of scopes and granularities. Since provenance-aware systems must meet the needs of a variety of users in academic, enterprise, and government sectors, any provenance mechanisms must be capable of supporting many different provenance models while simultaneously ensuring the security of the provenance they collect. We present the Linux Provenance Modules (LPM), the first general framework for the development of provenance-aware systems that imposes as little as 0.6% performance overhead on system operation. A key feature of LPM is its ability to leverage Linux’s existing security features to provide strong provenance security assurances. We go on to introduce a mechanism for policy-reduced provenance that reduces the costs of provenance collection by up to 74% by identifying a system’s trusted computing base. To our knowledge, this is the first working policybased provenance monitor proposed in the literature.
منابع مشابه
Trustworthy Whole-System Provenance for the Linux Kernel
In a provenance-aware system, mechanisms gather and report metadata that describes the history of each object being processed on the system, allowing users to understand how data objects came to exist in their present state. However, while past work has demonstrated the usefulness of provenance, less attention has been given to securing provenance-aware systems. Provenance itself is a ripe atta...
متن کاملCollecting Provenance via the Xen Hypervisor
The Provenance Aware Storage Systems project (PASS) currently collects system-level provenance by intercepting system calls in the Linux kernel and storing the provenance in a stackable filesystem. While this approach is reasonably efficient, it suffers from two significant drawbacks: each new revision of the kernel requires reintegration of PASS changes, the stability of which must be continua...
متن کاملExpressiveness Benchmarking for System-Level Provenance
Provenance is increasingly being used as a foundation for security analysis and forensics. System-level provenance can help us trace activities at the level of libraries or system calls, which offers great potential for detecting subtle malicious activities that can otherwise go undetected. However, analysing the raw provenance trace is challenging, due to scale and to differences in data repre...
متن کاملUsing Provenance Patterns to Vet Sensitive Behaviors in Android Apps
We propose Dagger, a lightweight system to dynamically vet sensitive behaviors in Android apps. Dagger avoids costly instrumentation of virtual machines or modifications to the Android kernel. Instead, Dagger reconstructs the program semantics by tracking provenance relationships and observing apps’ runtime interactions with the phone platform. More specifically, Dagger uses three types of low-...
متن کاملSecure Systems
MARCH/APRIL 2011 1540-7993/11/$26.00 © 2011 IEEE COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES 83 Patrick McDaniel Pennsylvania State University cesses and inputs that created or transformed the data. Where provenance enumerates the entities that contributed to the data. Consider a patient x-ray image document used in a healthcare system. The provenance record for that document wou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014