Design and implementation of a model for OS kernel integrity protection

Untrusted kernel extensions were considered to be a big threat to OS kernel integrity because once they were loaded into the kernel space,then they may corrupt both the OS kernel data and code at will.To address this problem,MAC-based model named MOKIP for OS kernel integrity protection was presente...

Full description

Saved in:
Bibliographic Details
Main Authors: Dong-hai TIAN, Jun-hua CHEN, Xiao-qi JIA, Chang-zhen HU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2015-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015289/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539569171824640
author Dong-hai TIAN
Jun-hua CHEN
Xiao-qi JIA
Chang-zhen HU
author_facet Dong-hai TIAN
Jun-hua CHEN
Xiao-qi JIA
Chang-zhen HU
author_sort Dong-hai TIAN
collection DOAJ
description Untrusted kernel extensions were considered to be a big threat to OS kernel integrity because once they were loaded into the kernel space,then they may corrupt both the OS kernel data and code at will.To address this problem,MAC-based model named MOKIP for OS kernel integrity protection was presented.The basic idea of MOKIP was to set different integrity labels for different entities in the kernel space,and then ensure that the entities with low integrity label cannot harm the entities with high integrity label.A prototype system based on the hardware assisted virtualization technology was implemented.The experimental results show that proposed system is effective at defending against various malicious kernel extension attacks within a little performance overhead which is less than 13%.
format Article
id doaj-art-425a60b7bf1e4e30ba1bb7306e421d95
institution Kabale University
issn 1000-436X
language zho
publishDate 2015-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-425a60b7bf1e4e30ba1bb7306e421d952025-01-14T06:54:20ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-11-013611812559697708Design and implementation of a model for OS kernel integrity protectionDong-hai TIANJun-hua CHENXiao-qi JIAChang-zhen HUUntrusted kernel extensions were considered to be a big threat to OS kernel integrity because once they were loaded into the kernel space,then they may corrupt both the OS kernel data and code at will.To address this problem,MAC-based model named MOKIP for OS kernel integrity protection was presented.The basic idea of MOKIP was to set different integrity labels for different entities in the kernel space,and then ensure that the entities with low integrity label cannot harm the entities with high integrity label.A prototype system based on the hardware assisted virtualization technology was implemented.The experimental results show that proposed system is effective at defending against various malicious kernel extension attacks within a little performance overhead which is less than 13%.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015289/kernel extensionsOS kernelintegrity protectionvirtualization technology
spellingShingle Dong-hai TIAN
Jun-hua CHEN
Xiao-qi JIA
Chang-zhen HU
Design and implementation of a model for OS kernel integrity protection
Tongxin xuebao
kernel extensions
OS kernel
integrity protection
virtualization technology
title Design and implementation of a model for OS kernel integrity protection
title_full Design and implementation of a model for OS kernel integrity protection
title_fullStr Design and implementation of a model for OS kernel integrity protection
title_full_unstemmed Design and implementation of a model for OS kernel integrity protection
title_short Design and implementation of a model for OS kernel integrity protection
title_sort design and implementation of a model for os kernel integrity protection
topic kernel extensions
OS kernel
integrity protection
virtualization technology
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015289/
work_keys_str_mv AT donghaitian designandimplementationofamodelforoskernelintegrityprotection
AT junhuachen designandimplementationofamodelforoskernelintegrityprotection
AT xiaoqijia designandimplementationofamodelforoskernelintegrityprotection
AT changzhenhu designandimplementationofamodelforoskernelintegrityprotection