Design and implementation of an extended reference monitor for trusted operating systems

  • Authors:
  • Hyung Chan Kim;Wook Shin;R. S. Ramakrishna;Kouichi Sakurai

  • Affiliations:
  • Department of Information and Communications, Gwangju Institute of Science and Technology, Gwangju, Rep. of Korea;Department of Computer Science, University of Illinois at Urbana-Champaign, IL;Department of Information and Communications, Gwangju Institute of Science and Technology, Gwangju, Rep. of Korea;Faculty of Computer Science and Communication Engineering, Kyushu University, Fukuoka, Japan

  • Venue:
  • ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Conventional access control schemes have supported confidentiality and integrity acknowledging the necessary organizational security policy in operating systems. However, many runtime attacks in operating systems involve behavioral semantics, indicating that attacks should be seen as a sequence of access operations. Ironically these attacks are legitimate under any access control policy. This is due to the lack of behavioral dimension in security enforcement. We propose an extended reference monitor to include this dimension. Our method is based on safety property specification on system call sequences. The reference monitor checks the trace at runtime for behavior control in Linux operating system.