How to Protecting Kernal Code and Data
Citation
Nisar Ahmed, Hafiz YasirRana, Muhammad TehseenQureshi, BadarqaShakoor"How to Protecting Kernal Code and Data", International Journal of Computer & organization Trends (IJCOT), V5(4):20-23 Jul - Aug 2015, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
Abstract Most of the computer having Von Neumann architecture now a day’s facing the risk of attack of modifying kernel code. It is due to same address space of kernel code as well as data. In this paper, we discuss the methods to protect kernel code as well as data. The main theme behind this paper is how to make secure kernel code.
References
[1] Z. Bai, L. Wang, J. Chen, L. Xu, J. Liu and X. Liu, “DTAD: a Dynamic Taint Analysis Detector for Information Security,” The Ninth International Confernce on Web-Age Information Management, vol. 2,591-597, 2008.
[2] J. Sun, X. Li, H. Chen and H. Tan, “A Virtualized Harvard Architectural Approach to Protect Kernel Code,” First International Workshop on Education Technology and Computer Science, 1020-1024, 2009.
[3] G. Junkai, J. Weiyong, “An Approach for Sensitive Binary File Protection,” International Forum on Information Technology and Applications, 716-718, 2009.
[4] H. Mohanty, M. VenkataSwamy, S. Ramaswamy, R.K. Shyamasundar, “Translating Security Policy to Executable Code for Sandboxing Linux Kernel,” Third UKSim European Symposium on Computer Modeling and Simulation, 124-129, 2009.
[5] S. Butt, V.Ganapathay, M.M.Swift and C. Chang, “Protecting Commodity Operating System Kernels from Vulnerable Device Drivers,” Annual Computer Security Applications Conference, 301-310,2009.
[6] X. Jiang, Y. Solihin, “Architectural Framework for SupportingOperating System Survivability,” NSFAward CCF, 457-465, 2011.
[7] J. Li, Z. Wang, T. Bletsch, D. Srinivasan, M. Grace and X. Jiang, “Comprehensive and Ef fi cient Protection of Kernel Control Data,” IEEE Transactions on Information Forensics and Security, vol. 6(4),1401-1417, 2011.
[8] B. Blackham, Y. Shi, S, Chattopadhyay, A. Roychoudhury and G.Heiser, “Timing Analysis of a Protected Operating System Kernel,”2011 IEEE 32nd Real-Time Systems Symposium, 339-348, 2011. [9] D. Stanley, D. Xu, E.H. Spafford, “Improved Kernel Security ThroughMemory Layout Randomization,” IEEE, 2013.
[10] F. Yamaguchi, N. Golde, D. Arp and K. Rieck, “Modeling and Discovering Vulnerabilities with Code Property Graphs,” 2014 IEEE Symposium on Security and Privacy, 590-604, 2014.
Keywords
Operating System; Kernal; Code; Data; Kernal Protection.