Enhancing security of the kernel stack for mitigating arbitrary execution in the kernel커널 내 임의코드 실행 방어를 위한 커널 스택 보호기법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 332
  • Download : 0
The Linux kernel stack has only limited space and shared by numerous threads. This feature was exploited by an attacker over 10 years, but any patch is done for resolving this issue. One of the vulnerability stems from this feature is Use-before-initialization (UBI) bug. UBI is a common type of memory error in which variables are declared and read from without being initialized beforehand. Exploiting such a vulnerability could allow the attacker to modify the control flow, or peek into sensitive memory values via information leak. However, even with its potential to compromise a program as crucial as Linux Kernel, UBI vulnerabilities rarely get attention compared to Use-After-Free vulnerabilities. Furthermore, current full memory-safety implements do not consider UBI vulnerabilities, lead to exposing a new attack path via CVE-2010-2963. Lu et al.[7] proposes UBI defenses as an extensive analysis of the source code but it causes a detrimental effect on the performance. This thesis presents StackCleaner, a stack sanitizer for mitigating the UBI vulnerability. StackCleaner minimizes the exploitability of a UBI vulnerability via initializing only used stack area by a system call, resulting in an uninitialized variable not be crafted by the attackers with rigged function calls. The prototype of StackCleaner is implemented for system calls in x86-64 Linux, and tried to boot using instrumented the Kernel image. The proposed mitigation, StackCleaner shows a few running overheads and does not harm the normal routine of the kernel, proving a few side effects.
Advisors
Kang, Brent Byung Hoonresearcher강병훈researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2018
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2018.8,[iv, 20 p. :]

Keywords

Kernel stack▼ause-before-initialization and system call; 커널 스택▼aUSI▼a시스템 콜

URI
http://hdl.handle.net/10203/267164
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=828642&flag=dissertation
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0