Please use this identifier to cite or link to this item:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/91047| Title: | K-Int, 作業系統核心完整性保護之執行器 K-Int, Kernel Code Integrity Enforcer |
| Authors: | Joey LI Joey LI |
| Advisor: | 黎士瑋 Shih-Wei Li |
| Keyword: | 系統安全,系統核心完整性,KVM,虛擬機, System Security,Kernel Integrity,KVM,Virtualization, |
| Publication Year : | 2023 |
| Degree: | 碩士 |
| Abstract: | None Many of the currently running OSes in the cloud are monolithic. Unfortunately, a monolithic design is prone to be highly vulnerable due to the nature of its arrangement. A single kernel vulnerability or a rootkit could grant the attacker full authority over the system. To mitigate this issue, we present K-Int, an additional layer of protection that ensures the execution of only approved code with the superuser privilege while still allowing external module loading even if the kernel is compromised. Past research has proposed solutions to improve the security of monolithic kernels. However, very few of them were built on Arm64. By relying on virtualization, K-Int interposes on all updates to the kernel page table and kernel code. Therefore, it prevents kernel code modification and malicious kernel page table manipulation. Since K-Int relies only on the basic hypervisor and Arm64’s features, it does not need the host hypervisor to provide complex implementations. In this sense, K-int is an extension that would be portable on hypervisors. K-Int leverages Arm virtualization extensions to protect Arm64 kernels. It is built upon SeKVM and reuses its formally verified functionality. The code base is composed of 4205 LoC and only 3 hypercalls to apply the protective layer. The implementation of K-Int over SeKVM suggests just a small overhead in performance at run time (e.g. < 2%). |
| URI: | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/91047 |
| DOI: | 10.6342/NTU202301655 |
| Fulltext Rights: | 未授權 |
| Appears in Collections: | 資訊網路與多媒體研究所 |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| ntu-111-2.pdf Restricted Access | 706.03 kB | Adobe PDF |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
