DIGGER: identifying OS dynamic kernel objects for run-time security analysis
Version 2 2024-06-17, 20:51Version 2 2024-06-17, 20:51
Version 1 2016-11-28, 15:26Version 1 2016-11-28, 15:26
journal contribution
posted on 2024-06-17, 20:51authored byA Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy
In operating systems, we usually refer to a running instance of a data structure (data type) as an object. Locating dynamic runtime kernel objects in physical memory is the most difficult step towards enabling implementation of robust operating system security solutions. In this paper, we address the problem of systemically uncovering all operating system dynamic kernel runtime objects, without any prior knowledge of the operating system kernel data layout in memory. We present a new hybrid approach – called DIGGER – that uncovers kernel runtime objects with nearly complete coverage, high accuracy and robust results. The information revealed allows detection of generic pointer exploits and data hooks. We have implemented a prototype of DIGGER and conducted an evaluation of its efficiency and effectiveness. To demonstrate our approach’s potential, we have also developed three different proof-of-concept operating system security tools based on the DIGGER approach.
History
Journal
International journal on internet and distributed computing systems
Volume
3
Pagination
184-194
Location
Dhaka, Bangladesh
ISSN
2219-1127
eISSN
2219-1887
Language
eng
Publication classification
C Journal article, C1.1 Refereed article in a scholarly journal