Remus: a security-enhanced operating system

  • Authors:
  • Massimo Bernaschi;Emanuele Gabrielli;Luigi V. Mancini

  • Affiliations:
  • Istituto Applicazioni del Calcolo, CNR, Rome, Italy;Università di Roma "La Sapienza," Rome, Italy;Università di Roma "La Sapienza," Rome, Italy

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a detailed analysis of the UNIX system calls and classify them according to their level of threat with respect to system penetration. Based on these results, an effective mechanism is proposed to control the invocation of critical, from the security viewpoint, system calls. The integration into existing UNIX operating systems is carried out by instrumenting the code of the system calls in such a way that the execution is granted only in the case where the invoking process and the value of the arguments comply with the rules held in an access control database. This method does not require changes in the kernel data structures and algorithms. All kernel modifications are transparent to the application processes that continue to work correctly with no need of source code changes or recompilation. A working prototype has been implemented as a loadable kernel module for the Linux operating system. The prototype is able to detect and block any attacks by which an intruder tries to gain direct access to the system as a privileged user.