Journal on Communications ›› 2015, Vol. 36 ›› Issue (Z1): 118-125.doi: 10.11959/j.issn.1000-436x.2015289

• Academic paper • Previous Articles     Next Articles

Design and implementation of a model for OS kernel integrity protection

Dong-hai TIAN1,2,Jun-hua CHEN2,Xiao-qi JIA3,Chang-zhen HU1   

  1. 1 Beijing Key Laboratory of Software Security Engineering Technology,Beijing Institute of Technology,Beijing 100081 China
    2 School of Management Zhengzhou 451191, China
    3 State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
  • Online:2015-11-25 Published:2015-12-29
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program);The Strategic Priority Research Program of the Chinese Academy of Sciences;The National Natural Science Foundation of China;The National Natural Science Foundation of China;Open Found of Key Laboratory of IOT Application Technology of Universities in Yunnan Province

Abstract:

Untrusted kernel extensions were considered to be a big threat to OS kernel integrity because once they were loaded into the kernel space,then they may corrupt both the OS kernel data and code at will.To address this problem,MAC-based model named MOKIP for OS kernel integrity protection was presented.The basic idea of MOKIP was to set different integrity labels for different entities in the kernel space,and then ensure that the entities with low integrity label cannot harm the entities with high integrity label.A prototype system based on the hardware assisted virtualization technology was implemented.The experimental results show that proposed system is effective at defending against various malicious kernel extension attacks within a little performance overhead which is less than 13%.

Key words: kernel extensions, OS kernel, integrity protection, virtualization technology

No Suggested Reading articles found!