Understanding Linux kernel vulnerabilities

被引:4
|
作者
Shameli-Sendi, Alireza [1 ]
机构
[1] Shahid Beheshti Univ SBU, Fac Comp Sci & Engn, Tehran, Iran
关键词
Software security; Linux kernel vulnerability; Vulnerability taxonomies; TAXONOMY;
D O I
10.1007/s11416-021-00379-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting the Linux kernel from malicious activities is of paramount importance. Several approaches have been proposed to analyze kernel-level vulnerabilities. Existing studies, however, have a strong focus on the attack type (e.g., buffer overflow). In this paper, we report on our analysis of 1,858 Linux kernel vulnerabilities covering a period of Jan 2010-Jan 2020. We classify these vulnerabilities from the attacker's view using various criteria such as the attacker's objective, the targeted subsystems of the kernel, the location from which vulnerabilities can be exploited (i.e., locally or remotely), the impact of the attack on confidentiality, system integrity and availability, and the complexity level associated with exploiting vulnerabilities. Our findings indicate the presence of a large number of low-complexity vulnerabilities. Most of them can be exploited from the local system, leading to attacks that can severely compromise the kernel quality of service, and allow attackers to gain privileged access
引用
收藏
页码:265 / 278
页数:14
相关论文
共 50 条
  • [31] The sense of logging in the Linux kernel
    Keyur Patel
    João Faccin
    Abdelwahab Hamou-Lhadj
    Ingrid Nunes
    Empirical Software Engineering, 2022, 27
  • [32] Stability and volatility in the Linux kernel
    Champaign, J
    Malton, A
    Dong, XY
    SIXTH INTERNATIONAL WORKSHOP ON PRINCIPLES OF SOFTWARE EVOLUTION, PROCEEDINGS, 2003, : 95 - 102
  • [33] The sense of logging in the Linux kernel
    Patel, Keyur
    Faccin, Joao
    Hamou-Lhadj, Abdelwahab
    Nunes, Ingrid
    EMPIRICAL SOFTWARE ENGINEERING, 2022, 27 (06)
  • [34] Hotswapping Linux kernel modules
    Lee, YF
    Chang, RC
    JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (02) : 163 - 175
  • [35] LKL: The Linux Kernel Library
    Purdila, Octavian
    Grijincu, Lucian Adrian
    Tapus, Nicolae
    9TH ROEDUNET IEEE INTERNATIONAL CONFERENCE, 2010, : 328 - 333
  • [36] Deadline scheduling in the Linux kernel
    Lelli, Juri
    Scordino, Claudio
    Abeni, Luca
    Faggioli, Dario
    SOFTWARE-PRACTICE & EXPERIENCE, 2016, 46 (06): : 821 - 839
  • [37] Identifying clones in the Linux kernel
    Casazza, G
    Antoniol, G
    Villano, U
    Merlo, E
    Di Penta, M
    FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 90 - 97
  • [38] RCU Usage in the Linux Kernel
    McKenney P.E.
    Fernandes J.
    Boyd-Wickizer S.
    Walpole J.
    Operating Systems Review (ACM), 2020, 54 (01): : 47 - 63
  • [39] Understanding Usability Vulnerabilities
    Jayaletchumi, T.
    Moorthy, Sambantha
    bin Ibrahim, Suhaimi
    Mahrin, Mohd Naz'ri
    ADVANCED SCIENCE LETTERS, 2018, 24 (06) : 4391 - 4394
  • [40] Two Vulnerabilities in Android OS Kernel
    Hei, Xiali
    Du, Xiaojiang
    Lin, Shan
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013, : 6123 - 6127