Detecting Stack Based Kernel Information Leaks

被引:3
|
作者
Peiro, S. [1 ]
Munoz, M. [1 ]
Masmano, M. [1 ]
Crespo, A. [1 ]
机构
[1] Univ Politecn Valencia, Inst Automat & Informat Ind AI2, E-46071 Valencia, Spain
关键词
D O I
10.1007/978-3-319-07995-0_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Linux kernel has become widely adopted in the mobile devices and cloud services, parallel to this has grown its abuse and misuse by attackers and malicious users. This has increased attention paid to kernel security through the deployment of kernel protection mechanisms. Kernel based attacks require reliability, kernel attack reliability is achieved through the information gathering stage where the attacker is able to gather enough information about the target to succeed. The taxonomy of kernel vulnerabilities includes information leaks, that are a class of vulnerabilities that permit access to the kernel memory layout and contents. Information leaks can improve the attack reliability allowing the attacker to read sensitive kernel data to bypass kernel based protections. In this work, we aim at the detection of stack based kernel information leaks to secure kernels. We analyse the problem of stack based kernel infoleaks, then we perform a classification of the causes of information disclosure vulnerabilities. Next, we propose an approach for the detection of stack based kernel infoleaks using static analysis techniques, and last we evaluate our approach applying it to the Linux kernel.
引用
收藏
页码:321 / 331
页数:11
相关论文
共 50 条
  • [1] Enforcing Stack-Based Information Leaks
    Georgescu, Adele
    [J]. INNOVATION VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOL I-VI, 2015, : 2807 - 2817
  • [2] kMVX: Detecting Kernel Information Leaks with Multi-variant Execution
    Osterlund, Sebastian
    Koning, Koen
    Olivier, Pierre
    Barbalace, Antonio
    Bos, Herbert
    Giuffrida, Cristiano
    [J]. TWENTY-FOURTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXIV), 2019, : 559 - 572
  • [3] Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning
    Emamdoost, Navid
    Wu, Qiushi
    Lu, Kangjie
    McCamant, Stephen
    [J]. 28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [4] DryJIN: Detecting Information Leaks in Android Applications
    Choi, Minseong
    Im, Yubin
    Ko, Steve
    Kwon, Yonghwi
    Jeon, Yuseok
    Cho, Haehyun
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024, 2024, 710 : 76 - 90
  • [5] Cyclone: Detecting Contention-Based Cache Information Leaks Through Cyclic Interference
    Harris, Austin
    Wei, Shijia
    Sahu, Prateek
    Kumar, Pranav
    Austin, Todd
    Tiwari, Mohit
    [J]. MICRO'52: THE 52ND ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, 2019, : 57 - 72
  • [6] Detecting Security Leaks in Hybrid Systems with Information Flow Analysis
    Luan Viet Nguyen
    Mohan, Gautam
    Weimer, James
    Sokolsky, Oleg
    Lee, Insup
    Alur, Rajeev
    [J]. 17TH ACM-IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2019,
  • [7] DETECTING LEAKS IN PIPE LINES USING SCADA INFORMATION.
    Wade, W.R.
    Rachford Jr., H.H.
    [J]. Pipe line industry Houston, Tex, 1988, 68 (01): : 64 - 66
  • [8] Model based detection of hydrogen leaks in a fuel cell stack
    Ingimundarson, Ari
    Stefanopoulou, Anna G.
    McKay, Denise
    [J]. 2005 44th IEEE Conference on Decision and Control & European Control Conference, Vols 1-8, 2005, : 1017 - 1022
  • [9] Detecting leaks with helium
    Valenti, M
    [J]. MECHANICAL ENGINEERING, 1996, 118 (02) : 44 - 44
  • [10] Detecting leaks underground
    [J]. Chemical Engineering (New York), 1997, 104 (08):