File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

문현곤

Moon, Hyungon
Computer Systems Security Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Architectural Supports to Protect OS Kernels from Code-Injection Attacks and Their Applications

Author(s)
Moon, HyungonLee, JinyongHwang, DongilJung, SeonhwaSeo, JiwonPaek, Yunheung
Issued Date
2017-10
DOI
10.1145/3110223
URI
https://scholarworks.unist.ac.kr/handle/201301/24550
Fulltext
https://dl.acm.org/citation.cfm?doid=3129756.3110223
Citation
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, v.23, no.1, pp.10
Abstract
The kernel code injection is a common behavior of kernel-compromising attacks where the attackers aim to gain their goals by manipulating an OS kernel. Several security mechanisms have been proposed to mitigate such threats, but they all suffer from non-negligible performance overhead. This article introduces a hardware reference monitor, called Kargos, which can detect the kernel code injection attacks with nearly zero performance cost. Kargos monitors the behaviors of an OS kernel from outside the CPU through the standard bus interconnect and debug interface available with most major microprocessors. By watching the execution traces and memory access events in the monitored target system, Kargos uncovers attempts to execute malicious code with the kernel privilege. On top of this, we also applied the architectural supports for Kargos to the detection of ROP attacks. KS-Stack is the hardware component that builds and maintains the shadow stacks using the existing supports to detect this ROP attacks. According to our experiments, Kargos detected all the kernel code injection attacks that we tested, yet just increasing the computational loads on the target CPU by less than 1% on average. The performance overhead of the KS-Stack was also less than 1%.
Publisher
ASSOC COMPUTING MACHINERY
ISSN
1084-4309
Keyword (Author)
Operating system securityarchitectural support for securitycode-injection attacksreturn-oriented programmingshadow stack

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.