ID | 69011 |
著者 |
Kuzuno, Hiroki
Graduate School of Engineering, Kobe University
Yamauchi, Toshihiro
Faculty of Environmental, Life, Natural Science and Technology, Okayama University
ORCID
Kaken ID
publons
researchmap
|
抄録 | Kernel memory corruption attacks against operating systems exploit kernel vulnerabilities to overwrite kernel data. Kernel address space layout randomization makes it difficult to identify kernel data by randomizing their virtual address space. Control flow integrity (CFI) prevents unauthorized kernel code execution by verifying kernel function calls. However, these countermeasures do not prohibit writing to kernel data. If the virtual address of privileged information is specified and CFI is circumvented, the privileged information can be modified by a kernel memory corruption attack. In this paper, we propose a restricted kernel page mechanism (RKPM) to mitigate kernel memory corruption attacks by introducing restricted kernel pages to protect the kernel data specified in the kernel. The RKPM focuses on the fact that kernel memory corruption attacks attempt to read the virtual addresses around the privileged information. The RKPM adopts page table mapping handling and a memory protection key to control the read and write restrictions of the restricted kernel pages. This allows us to mitigate kernel memory corruption attacks by capturing reads to the restricted kernel page before the privileged information is overwritten. As an evaluation of the RKPM, we confirmed that it can mitigate privilege escalation attacks on the latest Linux kernel. We also measured that there was a certain overhead in the kernel performance. This study enhances kernel security by mitigating privilege escalation attacks through the use of software or hardware based restricted kernel pages.
|
備考 | This is an Accepted Manuscript of a conference paper published by Springer Nature Singapore.
NSS 2024
Lecture Notes in Computer Science, volume 15564
This fulltext file will be available in Mar. 2026.
|
発行日 | 2025-03-14
|
出版物タイトル |
Network and System Security
|
出版者 | Springer Nature Singapore
|
開始ページ | 213
|
終了ページ | 231
|
ISSN | 0302-9743
|
資料タイプ |
会議発表論文
|
言語 |
英語
|
OAI-PMH Set |
岡山大学
|
著作権者 | © 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
|
論文のバージョン | author
|
DOI | |
関連URL | isVersionOf https://doi.org/10.1007/978-981-96-3531-3_11
|
Citation | Kuzuno, H., Yamauchi, T. (2025). RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks. In: Song, H.H., Di Pietro, R., Alrabaee, S., Tubishat, M., Al-kfairy, M., Alfandi, O. (eds) Network and System Security. NSS 2024. Lecture Notes in Computer Science, vol 15564. Springer, Singapore. https://doi.org/10.1007/978-981-96-3531-3_11
|
助成情報 |
23K24848:
機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究
( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
23K16882:
攻撃実行防止と攻撃対象保護による高セキュア基盤ソフトウェアの研究
( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
( 公益財団法人電気通信普及財団 / Telecommunications Advancement Foundation )
JPMJAX24M4:
攻撃耐性を備えたセキュアな基盤ソフトウェアの研究
( 国立研究開発法人科学技術振興機構 / Japan Science and Technology Agency )
|