Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security 2021
DOI: 10.1145/3433210.3453078
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Overhead of File Protection by Linux Security Modules

Abstract: Over the years, the complexity of the Linux Security Module (LSM) is keeping increasing (e.g. 10,684 LOC in Linux v2.6.0 vs. 64,018 LOC in v5.3), and the count of the authorization hooks is nearly doubled (e.g. 122 hooks in v2.6.0 vs. 224 hooks in v5.3). In addition, the computer industry has seen tremendous advancement in hardware (e.g., memory and processor frequency) in the past decade. These make the previous evaluation on LSM, which was done 18 years ago, less relevant nowadays. It is important to provide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…It is difficult to precisely measure LSM overhead [68]. In general, there exist two sources of overhead when performing audit (or other policy enforcement) through LSM: hooking and execution.…”
Section: Lsm Overheadmentioning
confidence: 99%
“…It is difficult to precisely measure LSM overhead [68]. In general, there exist two sources of overhead when performing audit (or other policy enforcement) through LSM: hooking and execution.…”
Section: Lsm Overheadmentioning
confidence: 99%
“…SMACK may also be absent from the support list. Additionally, due to their lower impact on the file loading overhead, many system installations choose AppArmor or TOMOYO instead of SELinux [7,8]. Additionally, SELinux implements MAC policies by means of contexts composed of users, roles, and types [9].…”
Section: Introductionmentioning
confidence: 99%
“…Enforcement hooks serve as checkpoints for security enforcement over specific access categories, while bookkeeping hooks enable a se-curity module to maintain stateful information about subjects and objects on the system. LSM hooks are not considered to be static, and often change between kernel versions as new hooks are implemented and both new and existing hooks placed into various kernel functions [158]. The eventual goal of the LSM framework is to provide complete mediation over kernel security events, however this is an evolving process and no formal verification exists to prove the security of LSM hooks [60].…”
Section: Linux Security Modules Selinux and Apparmormentioning
confidence: 99%
“…In the Complaining case, BPFBox and BPFContain significantly outperform AppArmor, a fact which can be attributed to inefficiencies in AppArmor's logging mechanism, which relies on the kernel's audit framework. The ring buffer maps used by BPFBox and BPFContain are known to exhibit comparatively less overhead [103,157,158]. Additional overhead may also arise due to differences in how…”
Section: Osbench File Creationmentioning
confidence: 99%