Deakin University
Browse

DIGGER: identifying OS dynamic kernel objects for run-time security analysis

Version 2 2024-06-17, 20:51
Version 1 2016-11-28, 15:26
journal contribution
posted on 2024-06-17, 20:51 authored by A Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy
In operating systems, we usually refer to a running instance of a data structure (data type) as an object. Locating dynamic runtime kernel objects in physical memory is the most difficult step towards enabling implementation of robust operating system security solutions. In this paper, we address the problem of systemically uncovering all operating system dynamic kernel runtime objects, without any prior knowledge of the operating system kernel data layout in memory. We present a new hybrid approach – called DIGGER – that uncovers kernel runtime objects with nearly complete coverage, high accuracy and robust results. The information revealed allows detection of generic pointer exploits and data hooks. We have implemented a prototype of DIGGER and conducted an evaluation of its efficiency and effectiveness. To demonstrate our approach’s potential, we have also developed three different proof-of-concept operating system security tools based on the DIGGER approach.

History

Journal

International journal on internet and distributed computing systems

Volume

3

Pagination

184-194

Location

Dhaka, Bangladesh

ISSN

2219-1127

eISSN

2219-1887

Language

eng

Publication classification

C Journal article, C1.1 Refereed article in a scholarly journal

Copyright notice

2013, IJIDCS

Issue

1

Publisher

IJIDCS Press

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC