Quantifiable Run-Time Kernel Attack Surface Reduction
نویسندگان
چکیده
The sheer size of commodity operating system kernels makes them a prime target for local attackers aiming to escalate privileges. At the same time, as much as 90% of kernel functions are not required for processing system calls originating from a typical network daemon. This results in an unnecessarily high exposure. In this paper, we introduce kRazor, an approach to reduce the kernel’s attack surface by limiting the amount of kernel code accessible to an application. KRAZOR first traces individual kernel functions used by an application. KRAZOR can then detect and prevent uses of unnecessary kernel functions by a process. This step is implemented as a kernel module that instruments select kernel functions. A heuristic on the kernel function selection allows KRAZOR to have negligible performance overhead. We evaluate results under real-world workloads for four typical server applications. Results show that the performance overhead and false positives remain low, while the attack surface reduction can be as high as 80%.
منابع مشابه
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels
Commodity OS kernels are known to have broad attack surfaces due to the large code base and the numerous features such as device drivers. For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is used. Within the used code, a certain part is invoked only at the runtime phase while the rest are executed at startup and/or shutdow...
متن کاملAttack Surface Metrics and Automated Compile-Time OS Kernel Tailoring
The economy of mechanism security principle states that program design should be kept as small and simple as possible. In practice, this principle is often disregarded to maximize user satisfaction, resulting in systems supporting a vast number of features by default, which in turn offers attackers a large code base to exploit. The Linux kernel exemplifies this problem: distributors include a l...
متن کاملAdaptive bandwidth selection in the long run covariance estimator of functional time series
In the analysis of functional time series an object which has seen increased use is the long run covariance function. It arises in several situations, including inference and dimension reduction techniques for high dimensional data, and new applications are being developed routinely. Given its relationship to the spectral density of finite dimensional time series, the long run covariance is nat...
متن کاملBiosynthesis of Ag Nanoparticles at Ziziphus Jujuba Kernel Substrate using Tilia platyphyllos Extract: Catalytic Activity for Reduction of Organic Dyes
For the first time the extract of the plant of Tilia platyphyllos was used to green synthesis of Ag nanoparticles (NPs) supported on Ziziphus jujuba kernel as an environmentally benign support. Ag NPs/ Ziziphus jujuba kernelas an effective catalyst was prepared through reduction of Ag+ions using Tilia platyphyllos extractas the reducing and capping agent and Ag NPs immobilization...
متن کاملImproved Kernel Security Through Code Validation, Diversification, and Minimization
Stanley, Dannie M. Ph.D., Purdue University, December 2013. Improved Kernel Security Through Code Validation, Diversification, and Minimization. Major Professors: Eugene H. Spafford and Dongyan Xu. The vast majority of hosts on the Internet, including mobile clients, are running one of three commodity, general-purpose operating system families. In such operating systems the kernel software exec...
متن کامل