کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
4955395 1444213 2018 11 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
A kernel stack protection model against attacks from kernel execution units
ترجمه فارسی عنوان
یک مدل حفاظت از پشته کرنل در برابر حملات از دستگاه های اجرایی هسته
کلمات کلیدی
مجازی سازی؛ تشخیص Rootkit؛ کنترل یکپارچگی جریان؛ هسته یکپارچه پشته؛ روت کیت Rett-to-sched
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی

Many defensive approaches have been proposed to protect the integrity of the operating system kernel stack. However, some types of attacks, such as the “return-to-schedule” rootkit, pose a serious threat to these approaches. In this paper, we present a kernel stack protection model to protect the integrity of the kernel stack. It adopts a synchronous design strategy to bind the execution unit with its kernel stack using virtualization technology, and allows the execution unit to write its own current kernel stack with legal kernel codes. To test the model, we propose three kinds of potential attacks which extend the “return-to-schedule” rootkit. The experimental results show that the prototype of the model can be effective against all attack methods, and introduces a performance cost of only 2%. Therefore, it effectively protects all types of data on the kernel stack with a small performance overhead.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computers & Security - Volume 72, January 2018, Pages 96-106
نویسندگان
, , , , ,