このエントリーをはてなブックマークに追加


ID 69011
著者
Kuzuno, Hiroki Graduate School of Engineering, Kobe University
Yamauchi, Toshihiro Faculty of Environmental, Life, Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
抄録
Kernel memory corruption attacks against operating systems exploit kernel vulnerabilities to overwrite kernel data. Kernel address space layout randomization makes it difficult to identify kernel data by randomizing their virtual address space. Control flow integrity (CFI) prevents unauthorized kernel code execution by verifying kernel function calls. However, these countermeasures do not prohibit writing to kernel data. If the virtual address of privileged information is specified and CFI is circumvented, the privileged information can be modified by a kernel memory corruption attack. In this paper, we propose a restricted kernel page mechanism (RKPM) to mitigate kernel memory corruption attacks by introducing restricted kernel pages to protect the kernel data specified in the kernel. The RKPM focuses on the fact that kernel memory corruption attacks attempt to read the virtual addresses around the privileged information. The RKPM adopts page table mapping handling and a memory protection key to control the read and write restrictions of the restricted kernel pages. This allows us to mitigate kernel memory corruption attacks by capturing reads to the restricted kernel page before the privileged information is overwritten. As an evaluation of the RKPM, we confirmed that it can mitigate privilege escalation attacks on the latest Linux kernel. We also measured that there was a certain overhead in the kernel performance. This study enhances kernel security by mitigating privilege escalation attacks through the use of software or hardware based restricted kernel pages.
備考
This is an Accepted Manuscript of a conference paper published by Springer Nature Singapore.
NSS 2024
Lecture Notes in Computer Science, volume 15564
This fulltext file will be available in Mar. 2026.
発行日
2025-03-14
出版物タイトル
Network and System Security
出版者
Springer Nature Singapore
開始ページ
213
終了ページ
231
ISSN
0302-9743
資料タイプ
会議発表論文
言語
英語
OAI-PMH Set
岡山大学
著作権者
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
論文のバージョン
author
DOI
関連URL
isVersionOf https://doi.org/10.1007/978-981-96-3531-3_11
Citation
Kuzuno, H., Yamauchi, T. (2025). RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks. In: Song, H.H., Di Pietro, R., Alrabaee, S., Tubishat, M., Al-kfairy, M., Alfandi, O. (eds) Network and System Security. NSS 2024. Lecture Notes in Computer Science, vol 15564. Springer, Singapore. https://doi.org/10.1007/978-981-96-3531-3_11
助成情報
23K24848: 機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
23K16882: 攻撃実行防止と攻撃対象保護による高セキュア基盤ソフトウェアの研究 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )
( 公益財団法人電気通信普及財団 / Telecommunications Advancement Foundation )
JPMJAX24M4: 攻撃耐性を備えたセキュアな基盤ソフトウェアの研究 ( 国立研究開発法人科学技術振興機構 / Japan Science and Technology Agency )