ID | 69009 |
フルテキストURL | |
著者 |
Kuzuno, Hiroki
Graduate School of Engineering, Kobe University
Yamauchi, Toshihiro
Faculty of Natural Science and Technology, Okayama University
ORCID
Kaken ID
publons
researchmap
|
抄録 | Vulnerable kernel codes are a threat to an operating system kernel. An adversary’s user process can forcefully invoke a vulnerable kernel code to cause privilege escalation or denial of service (DoS). Although service providers or security operators have to determine the effect of kernel vulnerabilities on their environment to decide the kernel updating, the list of vulnerable kernel codes are not provided from the common vulnerabilities and exposures (CVE) report. It is difficult to identify the vulnerable kernel codes from the exploitation result of the kernel which indicates the account information or the kernel suspension. To identify the details of kernel vulnerabilities, this study proposes a vulnerable kernel code tracer (vkTracer), which employs an alternative viewpoint using proof-of-concept (PoC) code to create a profile of kernel vulnerability. vkTracer traces the user process of the PoC code and the running kernel to hook the invocation of the vulnerable kernel codes. Moreover, vkTracer extracts the whole kernel component’s information using the running and static kernel image and debug section. The evaluation results indicated that vkTracer could trace PoC code executions (e.g., privilege escalation and DoS), identify vulnerable kernel codes, and generate kernel vulnerability profiles. Furthermore, the implementation of vkTracer revealed that the identification overhead ranged from 5.2683 s to 5.2728 s on the PoC codes and the acceptable system call latency was 3.7197 μs.
|
キーワード | Kernel vulnerability
Dynamic analysis
System security
|
備考 | This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.
WISA 2022
Lecture Notes in Computer Science, volume 13720
|
発行日 | 2023
|
出版物タイトル |
Information Security Applications
|
出版者 | Springer Nature Switzerland
|
開始ページ | 222
|
終了ページ | 234
|
ISSN | 0302-9743
|
資料タイプ |
会議発表論文
|
言語 |
英語
|
OAI-PMH Set |
岡山大学
|
著作権者 | © 2023 Springer Nature Switzerland AG
|
論文のバージョン | author
|
DOI | |
Web of Science KeyUT | |
関連URL | isVersionOf https://doi.org/10.1007/978-3-031-25659-2_16
|
Citation | Kuzuno, H., Yamauchi, T. (2023). vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability. In: You, I., Youn, TY. (eds) Information Security Applications. WISA 2022. Lecture Notes in Computer Science, vol 13720. Springer, Cham. https://doi.org/10.1007/978-3-031-25659-2_16
|
助成情報 |
19H04109:
攻撃耐性を持つ基盤ソフトウェア構築法の研究 研究課題
( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
22H03592:
機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究
( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
22S0302:
( ROIS NII Open Collaborative Research )
JPMJPR22PB:
( 国立研究開発法人科学技術振興機構 / Japan Science and Technology Agency )
|