KLRA: A Kernel Level Resource Auditing Tool For IoT Operating System Security

被引:5
|
作者
Li, Dong [1 ]
Zhang, Zhaonian [2 ]
Liao, Weiyuan [2 ]
Xu, Zhiwei [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
[2] Chinese Acad Sci, Univ Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
关键词
iot operating system; kernel level; resource auditor; security;
D O I
10.1109/SEC.2018.00058
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the rapid development of the Internet of Things facilitates human life and work, while it also brings great security risks to the society due to the frequent occurrence of various security issues. IoT device has the characteristics of large-scale deployment and single responsibility application, which makes it easy to cause a chain reaction and results in widespread privacy leakage and system security problems when the software vulnerability is identified. It is difficult to guarantee that there is no security hole in the IoT operating system which is usually designed for MCU and has no kernel mode. An alternative solution is to identify the security issues in the first time when the system is hijacked and suspend the suspicious task before it causes irreparable damage. This paper proposes KLRA (A Kernel Level Resource Auditing Tool) for IoT Operating System Security This tool collects the resource-sensitive events in the kernel and audit the the resource consumption pattern of the system at the same time. KLRA can take fine-grained events measure with low cost and report the relevant security warning in the first time when the behavior of the system is abnormal compared with daily operations for the real responsibility of this device. KLRA enables the IoT operating system for MCU to generate the security early warning and thereby provides a self-adaptive heuristic security mechanism for the entire IoT system.
引用
收藏
页码:427 / 432
页数:6
相关论文
共 27 条
  • [1] A Survey on Resource Management and Security Issues in IoT Operating Systems
    AlDossary, Noura
    AlQahtani, Sarah
    AlUbaidan, Haya
    [J]. 2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 26 - 30
  • [2] Security Tagging for a Zero-Kernel Operating System
    Song, Jia
    Alves-Foss, Jim
    [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 5049 - 5058
  • [3] KBT: Operating system kernel level binary translation system
    Jiang, Haitao
    Xu, Yun
    Liao, Yin
    Jin, Guojie
    Chen, Guoliang
    [J]. Journal of Software, 2013, 8 (06) : 1275 - 1280
  • [4] A system level resource estimation tool for FPGAs
    Shi, CC
    Hwang, J
    McMillan, S
    Root, A
    Singh, V
    [J]. FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 424 - 433
  • [5] Resource Allocation for Threat Defense in Cyber-security IoT system
    Wang, Manxi
    Liu, Bingjie
    Xu, Haitao
    [J]. 2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC), 2019, : 1 - 3
  • [6] User-level DMA without operating system kernel modification
    Markatos, EP
    Katevenis, MGH
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE - PROCEEDINGS, 1997, : 322 - 331
  • [7] Power Trust: Energy Auditing Aware Trust-Based System to Detect Security Attacks in IoT
    Subhash, P.
    Chandra, Gollapudi Ramesh
    Surya, K. Samrat
    [J]. 2021 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2021, : 265 - 269
  • [8] Welcome to Binder: A Kernel Level Attack Model for the Binder in Android Operating System
    Salehi, Majid
    Daryabar, Farid
    Tadayon, Mohammad Hesam
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 156 - 161
  • [9] Improving mobile device security with operating system-level virtualization
    Wessel, Sascha
    Huber, Manuel
    Stumpf, Frederic
    Eckert, Claudia
    [J]. COMPUTERS & SECURITY, 2015, 52 : 207 - 220
  • [10] Improving Mobile Device Security with Operating System-Level Virtualization
    Wessel, Sascha
    Stumpf, Frederic
    Herdt, Ilja
    Eckert, Claudia
    [J]. SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 148 - 161