Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]
DOI: 10.1109/fits.2003.1264934
|View full text |Cite
|
Sign up to set email alerts
|

Linux security modules: general security support for the linux kernel

Abstract: The access control mechanisms of existing mainstream operating systems are inadequate to provide strong system security. Enhanced access control mechanisms have failed to win acceptance into mainstream operating systems due in part to a lack of consensus within the security community on the right solution. Since generalpurpose operating systems must satisfy a wide range of user requirements, any access control mechanism integrated into such a system must be capable of supporting many different access control m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
203
0
2

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 194 publications
(207 citation statements)
references
References 21 publications
2
203
0
2
Order By: Relevance
“…An attacker overwrites a function pointer with the address of a function provided by the attacker, which will then allow the attacker to interpose on a desired set of kernel operations. In some sense, Linux Security Modules provide similar hooks for security enhancements [91]; the primary difference is that KOH repurposes other hooks used for purposes such as implementing an extensible virtual file system (VFS) model. The defenses against KOH attacks generally depend on whether the hook is located in the text or data segment.…”
Section: A Kernel Object Hookingmentioning
confidence: 99%
See 1 more Smart Citation
“…An attacker overwrites a function pointer with the address of a function provided by the attacker, which will then allow the attacker to interpose on a desired set of kernel operations. In some sense, Linux Security Modules provide similar hooks for security enhancements [91]; the primary difference is that KOH repurposes other hooks used for purposes such as implementing an extensible virtual file system (VFS) model. The defenses against KOH attacks generally depend on whether the hook is located in the text or data segment.…”
Section: A Kernel Object Hookingmentioning
confidence: 99%
“…A legacy OS, such as Linux, executes all security modules in the same address space and with the same privilege level as the rest of the kernel [91]. When this is coupled with a porous attack surface, malicious software can often load code into the OS kernel which disables security measures, such as virus scanners and intrusion detection.…”
Section: Introductionmentioning
confidence: 99%
“…Privileges are managed at much higher levels of granularity and security labels are applied on zone level rather than on individual resource level as in SELinux, with no concept of label transitions within a zone. The designers apparently eschewed the flexibility of the LSM/SELinux approach [14,3] in favor of a simpler conceptual model that is easier to use.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, a system which has implemented the BLP model is secure and could protect the privacy between information sharing. [21] is a framework in the Linux kernel that supports various computer security models and LSM has nothing to do with any separate security implementation. This framework is licensed under the GNU General Public License and it has been a part of the official Linux kernel since Linux 2.6.…”
Section: Blpmentioning
confidence: 99%