...
首页> 外文期刊>IEEE transactions on dependable and secure computing >System Call Monitoring Using Authenticated System Calls
【24h】

System Call Monitoring Using Authenticated System Calls

机译:使用经过身份验证的系统调用进行系统调用监视

获取原文
获取原文并翻译 | 示例
           

摘要

System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the program's normal behavior. Here, we introduce a new approach to implementing system call monitoring based on authenticated system calls. An authenticated system call is a system call augmented with extra arguments that specify the policy for that call, and a cryptographic message authentication code that guarantees the integrity of the policy and the system call arguments. This extra information is used by the kernel to verify the system call. The version of the application in which regular system calls have been replaced by authenticated calls is generated automatically by an installer program that reads the application binary, uses static analysis to generate policies, and then rewrites the binary with the authenticated calls. This paper presents the approach, describes a prototype implementation based on Linux and the Plto binary rewriting system, and gives experimental results suggesting that the approach is effective in protecting against compromised applications at modest cost.
机译:系统调用监视是一种通过在运行时检查每个系统调用是否符合指定程序正常行为的策略来检测和控制受感染应用程序的技术。在这里,我们介绍了一种新方法,用于基于已认证的系统调用来实现系统调用监视。经过身份验证的系统调用是一个系统调用,该系统调用添加了用于指定该调用策略的额外自变量,以及保证策略和系统调用自变量完整性的加密消息认证代码。内核使用此额外信息来验证系统调用。安装程序会自动生成应用程序的版本,在该版本中,常规系统调用已替换为已认证的调用,该安装程序会读取应用程序二进制文件,使用静态分析生成策略,然后使用已认证的调用重写二进制文件。本文介绍了该方法,描述了基于Linux和Plto二进制重写系统的原型实现,并给出了实验结果,表明该方法可有效地以适度的成本防止受到破坏的应用程序。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号