System Call Monitoring Using Authenticated System Calls

  • Authors:
  • Mohan Rajagopalan;Matti A. Hiltunen;Trevor Jim;Richard D. Schlichting

  • Affiliations:
  • IEEE;IEEE Computer Society;-;IEEE

  • Venue:
  • IEEE Transactions on Dependable and Secure Computing
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the program's normal behavior. Here, we introduce a new approach to implementing system call monitoring based on authenticated system calls. An authenticated system call is a system call augmented with extra arguments that specify the policy for that call, and a cryptographic message authentication code that guarantees the integrity of the policy and the system call arguments. This extra information is used by the kernel to verify the system call. The version of the application in which regular system calls have been replaced by authenticated calls is generated automatically by an installer program that reads the application binary, uses static analysis to generate policies, and then rewrites the binary with the authenticated calls. This paper presents the approach, describes a prototype implementation based on Linux and the Plto binary rewriting system, and gives experimental results suggesting that the approach is effective in protecting against compromised applications at modest cost.