このエントリーをはてなブックマークに追加


ID 69009
フルテキストURL
著者
Kuzuno, Hiroki Graduate School of Engineering, Kobe University
Yamauchi, Toshihiro Faculty of Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
抄録
Vulnerable kernel codes are a threat to an operating system kernel. An adversary’s user process can forcefully invoke a vulnerable kernel code to cause privilege escalation or denial of service (DoS). Although service providers or security operators have to determine the effect of kernel vulnerabilities on their environment to decide the kernel updating, the list of vulnerable kernel codes are not provided from the common vulnerabilities and exposures (CVE) report. It is difficult to identify the vulnerable kernel codes from the exploitation result of the kernel which indicates the account information or the kernel suspension. To identify the details of kernel vulnerabilities, this study proposes a vulnerable kernel code tracer (vkTracer), which employs an alternative viewpoint using proof-of-concept (PoC) code to create a profile of kernel vulnerability. vkTracer traces the user process of the PoC code and the running kernel to hook the invocation of the vulnerable kernel codes. Moreover, vkTracer extracts the whole kernel component’s information using the running and static kernel image and debug section. The evaluation results indicated that vkTracer could trace PoC code executions (e.g., privilege escalation and DoS), identify vulnerable kernel codes, and generate kernel vulnerability profiles. Furthermore, the implementation of vkTracer revealed that the identification overhead ranged from 5.2683 s to 5.2728 s on the PoC codes and the acceptable system call latency was 3.7197 μs.
キーワード
Kernel vulnerability
Dynamic analysis
System security
備考
This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.
WISA 2022
Lecture Notes in Computer Science, volume 13720
発行日
2023
出版物タイトル
Information Security Applications
出版者
Springer Nature Switzerland
開始ページ
222
終了ページ
234
ISSN
0302-9743
資料タイプ
会議発表論文
言語
英語
OAI-PMH Set
岡山大学
著作権者
© 2023 Springer Nature Switzerland AG
論文のバージョン
author
DOI
Web of Science KeyUT
関連URL
isVersionOf https://doi.org/10.1007/978-3-031-25659-2_16
Citation
Kuzuno, H., Yamauchi, T. (2023). vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability. In: You, I., Youn, TY. (eds) Information Security Applications. WISA 2022. Lecture Notes in Computer Science, vol 13720. Springer, Cham. https://doi.org/10.1007/978-3-031-25659-2_16
助成情報
19H04109: 攻撃耐性を持つ基盤ソフトウェア構築法の研究 研究課題 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
22H03592: 機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
22S0302: ( ROIS NII Open Collaborative Research )
JPMJPR22PB: ( 国立研究開発法人科学技術振興機構 / Japan Science and Technology Agency )