Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approach

Daniela Oliveira, Jesús Navarro, Nicholas Wetzel, M. Bucci
{"title":"Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approach","authors":"Daniela Oliveira, Jesús Navarro, Nicholas Wetzel, M. Bucci","doi":"10.1145/2554850.2554923","DOIUrl":null,"url":null,"abstract":"Kernel extensions, especially device drivers, make up a large fraction of modern OS kernels (approximately 70% in Linux). Most extensions are benign and represent a convenient approach for extending the kernel functionality and allowing a system to communicate with an increasing number of I/O devices. A small fraction of them are malicious and, as they run in kernel space, pose a threat to kernel integrity. From a security viewpoint this situation is paradoxical: modern OSes depend and must co-live with untrustworthy but needed extensions. Our immune system faces the same challenge: our body is made of a large number of bacteria, which are mostly benign and also carry out critical functions for our physiology. However, a small fraction of them pose a threat to our body as they can cause pathologies. The immune system maintains an homeostatic relationship with its microbiota by minimizing contact between bacteria and cell surfaces and confining bacteria to certain sites. Challenging the current trend that advocates leveraging only a hypervisor to defend the kernel (for considering it too vulnerable to defend itself), this paper advocates that modern OSes, like our immune system, should play an active role in maintaining healthy and safe interactions with their extensions. This work presents Ianus, a proof-of-concept prototype for this paradigm using Linux and the Bochs x86 emulator, which successfully minimized kernel extensions interactions with original kernel. Its security was evaluated with real rootkits and benign modules. Ianus' performance was analyzed with system and CPU benchmarks and it caused an small overhead to the system (approximately 12%).","PeriodicalId":285655,"journal":{"name":"Proceedings of the 29th Annual ACM Symposium on Applied Computing","volume":"149 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 29th Annual ACM Symposium on Applied Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2554850.2554923","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Kernel extensions, especially device drivers, make up a large fraction of modern OS kernels (approximately 70% in Linux). Most extensions are benign and represent a convenient approach for extending the kernel functionality and allowing a system to communicate with an increasing number of I/O devices. A small fraction of them are malicious and, as they run in kernel space, pose a threat to kernel integrity. From a security viewpoint this situation is paradoxical: modern OSes depend and must co-live with untrustworthy but needed extensions. Our immune system faces the same challenge: our body is made of a large number of bacteria, which are mostly benign and also carry out critical functions for our physiology. However, a small fraction of them pose a threat to our body as they can cause pathologies. The immune system maintains an homeostatic relationship with its microbiota by minimizing contact between bacteria and cell surfaces and confining bacteria to certain sites. Challenging the current trend that advocates leveraging only a hypervisor to defend the kernel (for considering it too vulnerable to defend itself), this paper advocates that modern OSes, like our immune system, should play an active role in maintaining healthy and safe interactions with their extensions. This work presents Ianus, a proof-of-concept prototype for this paradigm using Linux and the Bochs x86 emulator, which successfully minimized kernel extensions interactions with original kernel. Its security was evaluated with real rootkits and benign modules. Ianus' performance was analyzed with system and CPU benchmarks and it caused an small overhead to the system (approximately 12%).
Ianus:与内核扩展安全而全面的共存——一种免疫系统启发的方法
内核扩展,尤其是设备驱动程序,构成了现代操作系统内核的很大一部分(在Linux中大约占70%)。大多数扩展都是良性的,它们代表了扩展内核功能和允许系统与越来越多的I/O设备通信的方便方法。其中一小部分是恶意的,当它们在内核空间中运行时,会对内核完整性构成威胁。从安全角度来看,这种情况是矛盾的:现代操作系统依赖并且必须与不可信但必要的扩展共存。我们的免疫系统也面临着同样的挑战:我们的身体是由大量的细菌组成的,这些细菌大多是良性的,也对我们的生理起着至关重要的作用。然而,它们中的一小部分会对我们的身体构成威胁,因为它们会导致疾病。免疫系统通过尽量减少细菌与细胞表面的接触,并将细菌限制在某些部位,来维持与微生物群的稳态关系。当前的趋势主张仅利用管理程序来保护内核(因为认为它太脆弱而无法保护自己),本文挑战了这一趋势,主张现代操作系统,就像我们的免疫系统一样,应该在维护与其扩展的健康和安全交互方面发挥积极作用。这项工作提出了Ianus,这是一个使用Linux和Bochs x86模拟器的概念验证原型,它成功地减少了内核扩展与原始内核的交互。使用真实的rootkit和良性模块对其安全性进行了评估。Ianus的性能通过系统和CPU基准测试进行了分析,它给系统带来了很小的开销(大约12%)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信