首页> 外文会议>International Conference on Information Security >T-MAC: Protecting Mandatory Access Control System Integrity from Malicious Execution Environment on ARM-Based Mobile Devices
【24h】

T-MAC: Protecting Mandatory Access Control System Integrity from Malicious Execution Environment on ARM-Based Mobile Devices

机译:T-MAC:在基于ARM的移动设备上保护强制性访问控制系统完整性免受恶意执行环境的侵害

获取原文

摘要

Mobile security has become increasingly important in mobile computing, hence mandatory access control (MAC) systems have been widely used to protect it. However, malicious code in the mobile system may have significantly impact to the integrity of these MAC systems by forcing them to make the wrong access control decision, because they are running on the same privilege level and memory address space. Therefore, for a trusted MAC system, it is desired to be isolated from the malicious mobile system at runtime. In this paper, we propose a trusted MAC isolation framework called T-MAC to solve this problem. T-Mac puts the MAC system into the enclave provided by the ARM TrustZone so as to avert the direct impact of the malicious code on the access decision process. In the meanwhile, T-MAC provides a MAC supplicant client which runs in the mobile system kernel to effectively lookup policy decisions made by the back-end MAC service in the enclave and to enforce these rules on the system with trustworthy behaviors. Moreover, to protect T-MAC components that are not in the enclave, we not only provide a protection mechanism that enables TrustZone to protect the specific memory region from the compromised system, but establish a secure communication channel between the mobile system and the enclave as well. The prototype is based on SELinux, which is the widely used MAC system, and the base of SEAndroid. The experimental results show that SELinux receives enough protection, and the performance degradation that ranges between 0.53% to 7.34% compared to the original by employing T-MAC.
机译:移动安全在移动计算中变得越来越重要,因此,强制访问控制(MAC)系统已被广泛用于保护它。但是,移动系统中的恶意代码通过迫使它们做出错误的访问控制决定,可能会对这些MAC系统的完整性产生重大影响,因为它们在相同的特权级别和内存地址空间上运行。因此,对于可信的MAC系统,期望在运行时与恶意移动系统隔离。在本文中,我们提出了一种称为T-MAC的可信MAC隔离框架来解决此问题。 T-Mac将MAC系统放入ARM TrustZone提供的区域中,从而避免了恶意代码对访问决策过程的直接影响。同时,T-MAC提供了一个在移动系统内核中运行的MAC请求者客户端,以有效地查找飞地中后端MAC服务做出的策略决策,并以可信赖的行为在系统上强制执行这些规则。此外,为了保护不在飞地中的T-MAC组件,我们不仅提供了一种保护机制,使TrustZone可以保护特定的内存区域免受受到破坏的系统的侵害,而且可以在移动系统和飞地之间建立安全的通信通道,好。该原型基于SELinux(它是广泛使用的MAC系统)和SEAndroid的基础。实验结果表明,SELinux获得了足够的保护,与使用T-MAC的性能相比,SELinux的性能下降了0.53%至7.34%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号