Identifying OS kernel objects for run-time security analysis

  • Authors:
  • Amani S. Ibrahim;James Hamlyn-Harris;John Grundy;Mohamed Almorsy

  • Affiliations:
  • Centre for Computing and Engineering Software Systems Faculty of ICT, Swinburne University of Technology, Melbourne, Australia;Centre for Computing and Engineering Software Systems Faculty of ICT, Swinburne University of Technology, Melbourne, Australia;Centre for Computing and Engineering Software Systems Faculty of ICT, Swinburne University of Technology, Melbourne, Australia;Centre for Computing and Engineering Software Systems Faculty of ICT, Swinburne University of Technology, Melbourne, Australia

  • Venue:
  • NSS'12 Proceedings of the 6th international conference on Network and System Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

As dynamic kernel runtime objects are a significant source of security and reliability problems in Operating Systems (OSes), having a complete and accurate understanding of kernel dynamic data layout in memory becomes crucial. In this paper, we address the problem of systemically uncovering all OS dynamic kernel runtime objects, without any prior knowledge of the OS kernel data layout in memory. We present a new hybrid approach to uncover kernel runtime objects with nearly complete coverage, high accuracy and robust results against generic pointer exploits. We have implemented a prototype of our approach and conducted an evaluation of its efficiency and effectiveness. To demonstrate our approach's potential, we have also developed three different proof-of-concept OS security tools using it.