このエントリーをはてなブックマークに追加
ID 60101
フルテキストURL
著者
Yamauchi, Toshihiro Graduate School of Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
Akao, Yohei Graduate School of Natural Science and Technology, Okayama University. NTT Communications Corporation
Yoshitani, Ryota raduate School of Natural Science and Technology, Okayama University
Nakamura, Yuichi Hitachi Ltd.
Hashimoto, Masaki Graduate School of Information Security, Institute of Information Security
抄録
Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing in recent years. In particular, if administrator privileges are acquired by an attacker through a privilege escalation attack, the attacker can operate the entire system and cause serious damage. In this paper, we propose an additional kernel observer (AKO) that prevents privilege escalation attacks that exploit operating system vulnerabilities. We focus on the fact that a process privilege can be changed only by specific system calls. AKO monitors privilege information changes during system call processing. If AKO detects a privilege change after system call processing, whereby the invoked system call does not originally change the process privilege, AKO regards the change as a privilege escalation attack and applies countermeasures against it. AKO can therefore prevent privilege escalation attacks. Introducing the proposed method in advance can prevent this type of attack by changing any process privilege that was not originally changed in a system call, regardless of the vulnerability type. In this paper, we describe the design and implementation of AKO for Linux x86 64-bit. Moreover, we show that AKO can be expanded to prevent the falsification of various data in the kernel space. Then, we present an expansion example that prevents the invalidation of Security-Enhanced Linux. Finally, our evaluation results show that AKO is effective against privilege escalation attacks, while maintaining low overhead.
キーワード
Privilege escalation attack prevention
Operating system
Linux kernel vulnerabilities
Non-control-data attack
System security
発行日
2020-06-25
出版物タイトル
International Journal of Information Security
20巻
出版者
Springer
開始ページ
461
終了ページ
473
ISSN
1615-5262
NCID
AA11872752
資料タイプ
学術雑誌論文
言語
英語
OAI-PMH Set
岡山大学
著作権者
c Toshihiro Yamauchi et al
論文のバージョン
publisher
DOI
Web of Science KeyUT
関連URL
isVersionOf https://doi.org/10.1007/s10207-020-00514-7
ライセンス
http://creativecommons.org/licenses/by/4.0/
助成機関名
文部科学省
助成番号
JP19H04109