How to Protecting Kernal Code and Data

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2015 by IJCOT Journal
Volume - 5 Issue - 4
Year of Publication : 2015
Authors :  Nisar Ahmed, Hafiz YasirRana, Muhammad TehseenQureshi, BadarqaShakoor
DOI : 10.14445/22492593/IJCOT-V23P301

Citation

Nisar Ahmed, Hafiz YasirRana, Muhammad TehseenQureshi, BadarqaShakoor"How to Protecting Kernal Code and Data", International Journal of Computer & organization Trends (IJCOT), V5(4):20-23 Jul - Aug 2015, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract Most of the computer having Von Neumann architecture now a day’s facing the risk of attack of modifying kernel code. It is due to same address space of kernel code as well as data. In this paper, we discuss the methods to protect kernel code as well as data. The main theme behind this paper is how to make secure kernel code.

References

[1] Z. Bai, L. Wang, J. Chen, L. Xu, J. Liu and X. Liu, “DTAD: a Dynamic Taint Analysis Detector for Information Security,” The Ninth International Confernce on Web-Age Information Management, vol. 2,591-597, 2008.
[2] J. Sun, X. Li, H. Chen and H. Tan, “A Virtualized Harvard Architectural Approach to Protect Kernel Code,” First International Workshop on Education Technology and Computer Science, 1020-1024, 2009.
[3] G. Junkai, J. Weiyong, “An Approach for Sensitive Binary File Protection,” International Forum on Information Technology and Applications, 716-718, 2009.
[4] H. Mohanty, M. VenkataSwamy, S. Ramaswamy, R.K. Shyamasundar, “Translating Security Policy to Executable Code for Sandboxing Linux Kernel,” Third UKSim European Symposium on Computer Modeling and Simulation, 124-129, 2009.
[5] S. Butt, V.Ganapathay, M.M.Swift and C. Chang, “Protecting Commodity Operating System Kernels from Vulnerable Device Drivers,” Annual Computer Security Applications Conference, 301-310,2009.
[6] X. Jiang, Y. Solihin, “Architectural Framework for SupportingOperating System Survivability,” NSFAward CCF, 457-465, 2011.
[7] J. Li, Z. Wang, T. Bletsch, D. Srinivasan, M. Grace and X. Jiang, “Comprehensive and Ef fi cient Protection of Kernel Control Data,” IEEE Transactions on Information Forensics and Security, vol. 6(4),1401-1417, 2011.
[8] B. Blackham, Y. Shi, S, Chattopadhyay, A. Roychoudhury and G.Heiser, “Timing Analysis of a Protected Operating System Kernel,”2011 IEEE 32nd Real-Time Systems Symposium, 339-348, 2011. [9] D. Stanley, D. Xu, E.H. Spafford, “Improved Kernel Security ThroughMemory Layout Randomization,” IEEE, 2013.
[10] F. Yamaguchi, N. Golde, D. Arp and K. Rieck, “Modeling and Discovering Vulnerabilities with Code Property Graphs,” 2014 IEEE Symposium on Security and Privacy, 590-604, 2014.

Keywords
Operating System; Kernal; Code; Data; Kernal Protection.