The search functionality is under construction.

IEICE TRANSACTIONS on Information

Protection Mechanism of Kernel Data Using Memory Protection Key

Hiroki KUZUNO, Toshihiro YAMAUCHI

  • Full Text Views

    0

  • Cite this

Summary :

Memory corruption can modify the kernel data of an operating system kernel through exploiting kernel vulnerabilities that allow privilege escalation and defeats security mechanisms. To prevent memory corruption, the several security mechanisms are proposed. Kernel address space layout randomization randomizes the virtual address layout of the kernel. The kernel control flow integrity verifies the order of invoking kernel codes. The additional kernel observer focuses on the unintended privilege modifications. However, illegal writing of kernel data is not prevented by these existing security mechanisms. Therefore, an adversary can achieve the privilege escalation and the defeat of security mechanisms. This study proposes a kernel data protection mechanism (KDPM), which is a novel security design that restricts the writing of specific kernel data. The KDPM adopts a memory protection key (MPK) to control the write restriction of kernel data. The KDPM with the MPK ensures that the writing of privileged information for user processes and the writing of kernel data related to the mandatory access control. These are dynamically restricted during the invocation of specific system calls and the execution of specific kernel codes. Further, the KDPM is implemented on the latest Linux with an MPK emulator. The evaluation results indicate the possibility of preventing the illegal writing of kernel data. The KDPM showed an acceptable performance cost, measured by the overhead, which was from 2.96% to 9.01% of system call invocations, whereas the performance load on the MPK operations was 22.1ns to 1347.9ns. Additionally, the KDPM requires 137 to 176 instructions for its implementations.

Publication
IEICE TRANSACTIONS on Information Vol.E106-D No.9 pp.1326-1338
Publication Date
2023/09/01
Publicized
2023/06/30
Online ISSN
1745-1361
DOI
10.1587/transinf.2022ICP0013
Type of Manuscript
Special Section PAPER (Special Section on Information and Communication System Security)
Category

Authors

Hiroki KUZUNO
  Kobe University
Toshihiro YAMAUCHI
  Okayama University

Keyword