File Download

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

문현곤

Moon, Hyungon
Computer Systems Security Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 62367 -
dc.citation.startPage 62358 -
dc.citation.title IEEE ACCESS -
dc.citation.volume 11 -
dc.contributor.author Ha, Seon -
dc.contributor.author Yu, Minsang -
dc.contributor.author Moon, Hyungon -
dc.contributor.author Lee, Jongeun -
dc.date.accessioned 2023-12-21T12:36:40Z -
dc.date.available 2023-12-21T12:36:40Z -
dc.date.created 2023-07-26 -
dc.date.issued 2023-06 -
dc.description.abstract An operating system kernel has the highest privilege in most computer systems, making its code integrity critical to the entire system's security. Failure to protect the kernel code integrity allows an attacker to modify the kernel code pages directly or trick the kernel into executing instructions stored outside the kernel code pages. Existing prevention mechanisms rely on the memory management unit in which certain memory pages are marked as not-executable in supervisor mode to prevent such attacks. However, an attacker can bypass these existing mechanisms by directly manipulating the page table contents to mark the memory pages with malicious code as supervisor-executable. This paper shows that a small architectural extension enables a physical address-level mechanism to stop this threat without relying on page table integrity. PRIV LOCK lets, at boot time, the kernel specifies the physical address ranges containing its code. At run time, PRIV LOCK ensures that the content within the range is not manipulated and that only the instructions from those pages are executed while the processor runs in supervisor mode. Despite this protection, the kernel can still create new code pages (e.g., for loadable kernel modules) and make them executable with the help of PRIV LOCK 's secure loader. The experimental results show that PRIV LOCK incurs low performance (<0.5%), area (0.14-0.3%), and energy/power (0.053-2%) overhead. -
dc.identifier.bibliographicCitation IEEE ACCESS, v.11, pp.62358 - 62367 -
dc.identifier.doi 10.1109/ACCESS.2023.3285876 -
dc.identifier.issn 2169-3536 -
dc.identifier.scopusid 2-s2.0-85163180611 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/65092 -
dc.identifier.wosid 001021364500001 -
dc.language 영어 -
dc.publisher IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC -
dc.title Kernel Code Integrity Protection at the Physical Address Level on RISC-V -
dc.type Article -
dc.description.isOpenAccess TRUE -
dc.relation.journalWebOfScienceCategory Computer Science, Information Systems; Engineering, Electrical & Electronic; Telecommunications -
dc.relation.journalResearchArea Computer Science; Engineering; Telecommunications -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor System security -
dc.subject.keywordAuthor operating system security -
dc.subject.keywordAuthor RISC-V -
dc.subject.keywordAuthor linux -
dc.subject.keywordAuthor code-injection attack -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.