Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions

Cited 10 time in webofscience Cited 0 time in scopus
  • Hit : 1073
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorManes, Valentin J. M.ko
dc.contributor.authorJang, Daeheeko
dc.contributor.authorRyu, Chanhoko
dc.contributor.authorKang, Brent Byunghoonko
dc.date.accessioned2018-04-24T05:05:38Z-
dc.date.available2018-04-24T05:05:38Z-
dc.date.created2018-04-09-
dc.date.created2018-04-09-
dc.date.issued2018-05-
dc.identifier.citationCOMPUTERS & SECURITY, v.74, pp.130 - 143-
dc.identifier.issn0167-4048-
dc.identifier.urihttp://hdl.handle.net/10203/241291-
dc.description.abstractMonolithic kernel is one of the prevalent configurations out of various kernel design models. While monolithic kernel excels in performance and management, they are unequipped for runtime system update; and this brings the need for kernel extension. Although kernel extensions are a convenient measure for system management, it is well established that they make the system prone to rootkit attacks and kernel exploitation as they share the single memory space with the rest of the kernel. To address this problem, various forms of isolation (e.g., making into a process), are so far proposed, yet their performance overhead is often too high or incompatible for a general purpose kernel. In this paper, we propose Domain Isolated Kernel (DlKernel), a new kernel architecture which securely isolates the untrusted kernel extensions with minimal performance overhead. DlKernel leverages hardware based memory domain feature in ARM architecture; and prevents system manipulation attacks originated from kernel extensions, such as rootkits and exploits caused by buggy kernel extensions. We implemented DlKernel on top of Linux 4.13 kernel with 1500 LOC. Performance evaluation indicates that DlKernel imposes negligible overhead which is observed by cycle level microbenchmark. (C) 2018 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.subjectARCHITECTURE-
dc.titleDomain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions-
dc.typeArticle-
dc.identifier.wosid000428098500008-
dc.identifier.scopusid2-s2.0-85041415903-
dc.type.rimsART-
dc.citation.volume74-
dc.citation.beginningpage130-
dc.citation.endingpage143-
dc.citation.publicationnameCOMPUTERS & SECURITY-
dc.identifier.doi10.1016/j.cose.2018.01.009-
dc.contributor.localauthorKang, Brent Byunghoon-
dc.contributor.nonIdAuthorManes, Valentin J. M.-
dc.contributor.nonIdAuthorJang, Daehee-
dc.contributor.nonIdAuthorRyu, Chanho-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorKernel-
dc.subject.keywordAuthorARM-
dc.subject.keywordAuthorDACR-
dc.subject.keywordAuthorRootkit-
dc.subject.keywordAuthorSoftware vulnerability-
dc.subject.keywordAuthorExtension-
dc.subject.keywordPlusARCHITECTURE-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 10 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0