首页> 外文会议> >KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels
【24h】

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels

机译:KASR:减少商品OS内核攻击面的可靠实用方法

获取原文

摘要

Commodity OS kernels have broad attack surfaces due to the large code base and the numerous features such as device drivers. For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is used. Within the used code, a certain part is invoked only at runtime while the rest are executed at startup and/or shutdown phases in the kernel's lifetime run. In this paper, we propose a reliable and practical system, named KASR, which transparently reduces attack surfaces of commodity OS kernels at runtime without requiring their source code. The KASR system, residing in a trusted hypervisor, achieves the attack surface reduction through a two-step approach: (1) reliably depriving unused code of executable permissions, and (2) transparently segmenting used code and selectively activating them. We implement a prototype of KASR on Xen-4.8.2 hypervisor and evaluate its security effectiveness on Linux kernel-4.4.0-87-generic. Our evaluation shows that KASR reduces the kernel attack surface by 64% and trims off 40% of CVE vulnerabilities. Besides, KASR successfully detects and blocks all 6 real-world kernel rootkits. We measure its performance overhead with three benchmark tools (i.e., SPECINT, httperf and bonnie++). The experimental results indicate that KASR imposes less than 1% performance overhead (compared to an unmodified Xen hypervisor) on all the benchmarks.
机译:由于庞大的代码库和众多功能(例如设备驱动程序),商品OS内核具有广泛的攻击面。对于实际的用例(例如,Apache服务器),许多内核服务未使用,并且仅使用少量的内核代码。在使用的代码中,某个部分仅在运行时被调用,而其余部分则在内核生命周期中的启动和/或关闭阶段执行。在本文中,我们提出了一种可靠且实用的系统,称为KASR,该系统可以在运行时透明地减少商品OS内核的受攻击面,而无需其源代码。驻留在受信任的虚拟机管理程序中的KASR系统通过两步方法实现了减少攻击面的目的:(1)可靠地剥夺未使用代码的可执行权限,以及(2)透明地分割已使用的代码并有选择地激活它们。我们在Xen-4.8.2系统管理程序上实现KASR的原型,并在Linux kernel-4.4.0-87-generic上评估其安全性。我们的评估表明,KASR将内核攻击面减少了64%,并消除了40%的CVE漏洞。此外,KASR成功检测并阻止了所有6个真实世界的内核rootkit。我们使用三种基准工具(即SPECINT,httperf和bonnie ++)来衡量其性能开销。实验结果表明,在所有基准测试中,KASR的性能开销(与未修改的Xen虚拟机管理程序相比)不到1%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号