Identifying OS kernel objects for run-time security analysis

Amani S. Ibrahim, James Hamlyn-Harris, John Grundy, Mohamed Almorsy

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Abstract

As dynamic kernel runtime objects are a significant source of security and reliability problems in Operating Systems (OSes), having a complete and accurate understanding of kernel dynamic data layout in memory becomes crucial. In this paper, we address the problem of systemically uncovering all OS dynamic kernel runtime objects, without any prior knowledge of the OS kernel data layout in memory. We present a new hybrid approach to uncover kernel runtime objects with nearly complete coverage, high accuracy and robust results against generic pointer exploits. We have implemented a prototype of our approach and conducted an evaluation of its efficiency and effectiveness. To demonstrate our approach's potential, we have also developed three different proof-of-concept OS security tools using it.

Original languageEnglish
Title of host publicationNetwork and System Security - 6th International Conference, NSS 2012, Proceedings
Pages72-85
Number of pages14
Volume7645 LNCS
DOIs
Publication statusPublished - 2012
Externally publishedYes
EventInternational Conference on Network and System Security 2012 - Wuyishan, Fujian, China
Duration: 21 Nov 201223 Nov 2012
Conference number: 6th

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7645 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Network and System Security 2012
Abbreviated titleNSS 2012
Country/TerritoryChina
CityWuyishan, Fujian
Period21/11/1223/11/12

Keywords

  • Kernel Data Structures
  • Operating Systems
  • Runtime Objects

Cite this