Static analysis based invariant detection for commodity operating systems

被引:3
|
作者
Zhu, Feng [1 ]
Wei, Jinpeng [1 ]
机构
[1] Florida Int Univ, Sch Comp & Informat Sci, Miami, FL 33199 USA
关键词
Integrity modeling; Invariants detection; Malware detection; Static analysis; Tools;
D O I
10.1016/j.cose.2014.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent interest in runtime attestation requires modeling of a program's runtime behavior to formulate its integrity properties. In this paper, we study the possibility of employing static source code analysis to derive integrity models of a commodity operating systems kernel. We develop a precise and static analysis-based data invariant detection tool that overcomes several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We apply our tool to Linux kernel 2.4.32 and Windows Research Kernel (WRK). For Linux kernel 2.4.32, our tool identifies 284,471 data invariants that are critical to its runtime integrity, e.g., we use them to detect ten real-world Linux rootkits. Furthermore, comparison with the result of a dynamic invariant detector reveals 17,182 variables that can cause false alarms for the dynamic detector in the constant invariants category. Our tool also works successfully for WRK and reports 202,992 invariants, which we use to detect nine real-world Windows malware and one synthetic Windows malware. When compared with a dynamic invariant detector, we see similar results in terms of false alarms. Our experience suggests that static analysis is a viable option for automated integrity property derivation, and it can have very low false positive rate and very low false negative rate (e.g., for the constant invariants of WRK, the false positive rate is one out of 100,822 and the false negative rate is 0.007% or seven out of 100,822). (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:49 / 63
页数:15
相关论文
共 50 条
  • [1] Static Analysis Based Invariant Detection for Commodity Operating Systems Invited Paper
    Wei, Jinpeng
    Zhu, Feng
    Shinjo, Yasushi
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2011, : 287 - 296
  • [2] Intrusion Survivability for Commodity Operating Systems
    Chevalier, Ronny
    Plaquin, David
    Dalton, Chris
    Hiet, Guillaume
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (04):
  • [3] Improving the reliability of commodity operating systems
    Swift, MM
    Bershad, BN
    Levy, HM
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2005, 23 (01): : 77 - 110
  • [4] SoK: Rowhammer on Commodity Operating Systems
    Zhang, Zhi
    Chen, Decheng
    Qi, Jiahao
    Cheng, Yueqiang
    Jiang, Shijie
    Lin, Yiyang
    Gao, Yansong
    Nepal, Surya
    Zou, Yi
    Zhang, Jiliang
    Xiang, Yang
    [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 436 - 452
  • [5] SLIC: An extensibility system for commodity operating systems
    Ghormley, DP
    Petrou, D
    Anderson, TE
    Rodrigues, SH
    [J]. PROCEEDINGS OF THE USENIX 1998 ANNUAL TECHNICAL CONFERENCE, 1998, : 39 - 52
  • [6] Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
    Chen, Xiaoxin
    Garfinkel, Tal
    Lewis, E. Christopher
    Subrahmanyam, Pratap
    Waldspurger, Carl A.
    Boneh, Dan
    Dwoskin, Jeffrey
    Ports, Dan R. K.
    [J]. ACM SIGPLAN NOTICES, 2008, 43 (03) : 2 - 13
  • [7] Generic invariant-based static analysis tool for detection of runtime errors in Java']Java programs
    Skevoulis, S
    Jia, XP
    [J]. 37TH INTERNATIONAL CONFERENCE ON TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, : 36 - 44
  • [8] Encoding-based Range Detection in Commodity RFID Systems
    Yu, Xi
    Liu, Jia
    Zhang, Shigeng
    Chen, Xingyu
    Zhang, Xu
    Chen, Lijun
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 680 - 689
  • [9] HPMMAP: Lightweight Memory Management for Commodity Operating Systems
    Kocoloski, Brian
    Lange, John
    [J]. 2014 IEEE 28TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM, 2014,
  • [10] A static analysis approach for Android permission-based malware detection systems
    Arif, Juliza Mohamad
    Ab Razak, Mohd Faizal
    Awang, Suryanti
    Mat, Sharfah Ratibah Tuan
    Ismail, Nor Syahidatul Nadiah
    Firdaus, Ahmad
    [J]. PLOS ONE, 2021, 16 (09):