このエントリーをはてなブックマークに追加
ID 69009
FullText URL
Author
Kuzuno, Hiroki Graduate School of Engineering, Kobe University
Yamauchi, Toshihiro Faculty of Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
Abstract
Vulnerable kernel codes are a threat to an operating system kernel. An adversary’s user process can forcefully invoke a vulnerable kernel code to cause privilege escalation or denial of service (DoS). Although service providers or security operators have to determine the effect of kernel vulnerabilities on their environment to decide the kernel updating, the list of vulnerable kernel codes are not provided from the common vulnerabilities and exposures (CVE) report. It is difficult to identify the vulnerable kernel codes from the exploitation result of the kernel which indicates the account information or the kernel suspension. To identify the details of kernel vulnerabilities, this study proposes a vulnerable kernel code tracer (vkTracer), which employs an alternative viewpoint using proof-of-concept (PoC) code to create a profile of kernel vulnerability. vkTracer traces the user process of the PoC code and the running kernel to hook the invocation of the vulnerable kernel codes. Moreover, vkTracer extracts the whole kernel component’s information using the running and static kernel image and debug section. The evaluation results indicated that vkTracer could trace PoC code executions (e.g., privilege escalation and DoS), identify vulnerable kernel codes, and generate kernel vulnerability profiles. Furthermore, the implementation of vkTracer revealed that the identification overhead ranged from 5.2683 s to 5.2728 s on the PoC codes and the acceptable system call latency was 3.7197 μs.
Keywords
Kernel vulnerability
Dynamic analysis
System security
Note
This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.
WISA 2022
Lecture Notes in Computer Science, volume 13720
Published Date
2023
Publication Title
Information Security Applications
Publisher
Springer Nature Switzerland
Start Page
222
End Page
234
ISSN
0302-9743
Content Type
Conference Paper
language
English
OAI-PMH Set
岡山大学
Copyright Holders
© 2023 Springer Nature Switzerland AG
File Version
author
DOI
Web of Science KeyUT
Related Url
isVersionOf https://doi.org/10.1007/978-3-031-25659-2_16
Citation
Kuzuno, H., Yamauchi, T. (2023). vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability. In: You, I., Youn, TY. (eds) Information Security Applications. WISA 2022. Lecture Notes in Computer Science, vol 13720. Springer, Cham. https://doi.org/10.1007/978-3-031-25659-2_16
助成情報
19H04109: 攻撃耐性を持つ基盤ソフトウェア構築法の研究 研究課題 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
22H03592: 機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
22S0302: ( ROIS NII Open Collaborative Research )
JPMJPR22PB: ( 国立研究開発法人科学技術振興機構 / Japan Science and Technology Agency )