2014
DOI: 10.1007/978-3-319-08509-8_12
|View full text |Cite
|
Sign up to set email alerts
|

Quantifiable Run-Time Kernel Attack Surface Reduction

Abstract: Abstract. The sheer size of commodity operating system kernels makes them a prime target for local attackers aiming to escalate privileges. At the same time, as much as 90% of kernel functions are not required for processing system calls originating from a typical network daemon. This results in an unnecessarily high exposure. In this paper, we introduce kRazor, an approach to reduce the kernel's attack surface by limiting the amount of kernel code accessible to an application. KRAZOR first traces individual k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(21 citation statements)
references
References 41 publications
0
21
0
Order By: Relevance
“…DRIP [37] eliminates malicious logic from a trojaned kernel driver by iteratively trimming away unnecessary code from the based on off-line profiling. Besides these off-line kernel reduction works, kRazor [43] is an OS mechanism that restricts accesses to kernel code from user-level applications based on run-time profiling of workloads. FACE-CHANGE [36] identifies the minimized kernel memory for each application based on runtime profiling and projects the memory while the application is in production using virtualization techniques.…”
Section: Related Workmentioning
confidence: 99%
“…DRIP [37] eliminates malicious logic from a trojaned kernel driver by iteratively trimming away unnecessary code from the based on off-line profiling. Besides these off-line kernel reduction works, kRazor [43] is an OS mechanism that restricts accesses to kernel code from user-level applications based on run-time profiling of workloads. FACE-CHANGE [36] identifies the minimized kernel memory for each application based on runtime profiling and projects the memory while the application is in production using virtualization techniques.…”
Section: Related Workmentioning
confidence: 99%
“…It can protect the kernel against code injection attacks. KRazor [11] is an approach to reduce the kernel attack surface by limiting the amount of kernel code accessible to an application and can detect and prevent uses of unnecessary kernel functions by a process. Kernel ASLR [12] can protect the important kernel data structures and function-pointers by randomizing the address space layouts of them.…”
Section: Related Workmentioning
confidence: 99%
“…But it cannot defense the attack method proposed in this paper, for the relative address is used in our attack. Other academic achievements, such as kRazor [34] and randomization of structures in kernel [35], are limited to large-scale promotion 9 Wireless Communications and Mobile Computing application for the compatibility with the commercial distribution of Linux.…”
Section: Security Analysismentioning
confidence: 99%