File Download

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

문현곤

Moon, Hyungon
Computer Systems Security Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Kernel Code Integrity Protection at the Physical Address Level on RISC-V

Author(s)
Ha, SeonYu, MinsangMoon, HyungonLee, Jongeun
Issued Date
2023-06
DOI
10.1109/ACCESS.2023.3285876
URI
https://scholarworks.unist.ac.kr/handle/201301/65092
Citation
IEEE ACCESS, v.11, pp.62358 - 62367
Abstract
An operating system kernel has the highest privilege in most computer systems, making its code integrity critical to the entire system's security. Failure to protect the kernel code integrity allows an attacker to modify the kernel code pages directly or trick the kernel into executing instructions stored outside the kernel code pages. Existing prevention mechanisms rely on the memory management unit in which certain memory pages are marked as not-executable in supervisor mode to prevent such attacks. However, an attacker can bypass these existing mechanisms by directly manipulating the page table contents to mark the memory pages with malicious code as supervisor-executable. This paper shows that a small architectural extension enables a physical address-level mechanism to stop this threat without relying on page table integrity. PRIV LOCK lets, at boot time, the kernel specifies the physical address ranges containing its code. At run time, PRIV LOCK ensures that the content within the range is not manipulated and that only the instructions from those pages are executed while the processor runs in supervisor mode. Despite this protection, the kernel can still create new code pages (e.g., for loadable kernel modules) and make them executable with the help of PRIV LOCK 's secure loader. The experimental results show that PRIV LOCK incurs low performance (<0.5%), area (0.14-0.3%), and energy/power (0.053-2%) overhead.
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
ISSN
2169-3536
Keyword (Author)
System securityoperating system securityRISC-Vlinuxcode-injection attack

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.