Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊網路與多媒體研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/91047
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor黎士瑋zh_TW
dc.contributor.advisorShih-Wei Lien
dc.contributor.authorJoey LIzh_TW
dc.contributor.authorJoey LIen
dc.date.accessioned2023-10-24T16:52:56Z-
dc.date.available2025-10-17-
dc.date.copyright2023-10-24-
dc.date.issued2023-
dc.date.submitted2023-08-04-
dc.identifier.citation[1] Apache http server benchmarking tool. http://httpd.apache.org/docs/2.4/programs/ab.html.
[2] Arm architecture reference manual for a-profile architecture,. https://developer.arm.com/documentation/ddi0487/latest/.
[3] Arm system memory management unit architecture specification. https://developer.arm.com/documentation/ihi0070/latest.
[4] Cve details linux kernel vulnerability statistics. https://www.cvedetails.com/product/47/Linux-Linux-Kernel.html?vendor_id=33.
[5] Improve hackbench. http://people.redhat.com/mingo/cfs-scheduler/tools/hackbench.c, 2008.
[6] Mwr labs. windows 8 kernel memory protections by-pass. http://labs.mwrinfosecurity.com/blog/2014/08/15/windows-8-kernel-memoryprotections-bypass, 2014.
[7] Kaiser: hiding the kernel from user space. https://lwn.net/Articles/738975/, 2017.
[8] Virtualization based security. https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-vbs, 2023.
[9] D. Boggs, G. Brown, N. Tuck, and K. Venkatraman. Denver: Nvidia’s first 64-bit arm processor. IEEE Micro, 35(2):46–55, 2015.
[10] D. Calavera and L. Fontana. Linux Observability with BPF: Advanced Programming for Performance Analysis and Networking. O’Reilly Media, 2019.
[11] N. Carlini, A. Barresi, M. Payer, D. Wagner, and T. R. Gross. {Control-Flow} bend-ing: On the effectiveness of {Control-Flow} integrity. In 24th USENIX Security Symposium (USENIX Security 15), pages 161–176, 2015.
[12] N. Dautenhahn, T. Kasampalis, W. Dietz, J. Criswell, and V. Adve. Nested kernel: An operating system architecture for intra-kernel privilege separation. In Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 191–206, 2015.
[13] L. Davi, D. Gens, C. Liebchen, and A.-R. Sadeghi. Pt-rand: Practical mitigation of data-only attacks against page tables. In NDSS, 2017.
[14] X. Ge, H. Vijayakumar, and T. Jaeger. Sprobes: Enforcing kernel code integrity on the trustzone architecture. arXiv preprint arXiv:1410.7747, 2014.
[15] X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based `out-of-the-box'semantic view. In 14th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA (November 2007), volume 10.
[16] R. Jones. Netperf. https://github.com/HewlettPackard/netperf, Accessed 2023.
[17] S. Kim, J. Park, K. Lee, I. You, and K. Yim. A brief survey on rootkit techniques in malicious codes. J. Internet Serv. Inf. Secur., 2(3/4):134–147, 2012.
[18] T. Kornau et al. Return oriented programming for the ARM architecture. PhD thesis, Master's thesis, Ruhr-Universität Bochum, 2010.
[19] J. Lee, H. Ham, I. Kim, and J. Song. Poster: Page table manipulation attack. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 1644–1646, 2015.
[20] S. Matsuoka. Fugaku and a64fx: the first exascale supercomputer and its innovative arm cpu. In 2021 Symposium on VLSI Circuits, pages 1–3. IEEE, 2021.
[21] N. L. Petroni Jr and M. Hicks. Automated detection of persistent kernel control-flow attacks. In Proceedings of the 14th ACM conference on Computer and communications security, pages 103–115, 2007.
[22] N. Rajovic, P. M. Carpenter, I. Gelado, N. Puzovic, A. Ramirez, and M. Valero. Supercomputing with commodity cpus: Are mobile socs ready for hpc? In Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, pages 1–12, 2013.
[23] N. Rajovic, A. Rico, N. Puzovic, C. Adeniyi-Jones, and A. Ramirez. Tibidabo: Making the case for an arm-based hpc system. Future Generation Computer Systems, 36:322–334, 2014.
[24] R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In Recent Advances in Intrusion Detection: 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings 11, pages 1–20. Springer, 2008.
[25] S. Rostedt and R. Hat. Ftrace kernel hooks: more than just tracing. In Linux Plumbers Conference, 2014.
[26] A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, pages 335–350, 2007.
[27] Y. Sverdlik. Paypal deploys arm servers in data centers, 2015.
[28] D. Tian, R. Ma, X. Jia, and C. Hu. A kernel rootkit detection approach based on virtualization and machine learning. IEEE Access, 7:91657–91666, 2019.
[29] M. Tran, M. Etheridge, T. Bletsch, X. Jiang, V. Freeh, and P. Ning. On the expressiveness of return-into-libc attacks. In Recent Advances in Intrusion Detection: 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings 14, pages 121–141. Springer, 2011.
[30] X. Wang, J. Zhang, A. Zhang, and J. Ren. Tkrd: Trusted kernel rootkit detection for cybersecurity of vms based on machine learning and memory forensic analysis. Mathematical Biosciences and Engineering, 16(4):2650–2667, 2019.
[31] J.-K. Zinzindohoué, K. Bhargavan, J. Protzenko, and B. Beurdouche. Hacl*: A verified modern cryptographic library. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 1789–1806, 2017.
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/91047-
dc.description.abstractNonezh_TW
dc.description.abstractMany of the currently running OSes in the cloud are monolithic. Unfortunately, a monolithic design is prone to be highly vulnerable due to the nature of its arrangement. A single kernel vulnerability or a rootkit could grant the attacker full authority over the system. To mitigate this issue, we present K-Int, an additional layer of protection that ensures the execution of only approved code with the superuser privilege while still allowing external module loading even if the kernel is compromised. Past research has proposed solutions to improve the security of monolithic kernels. However, very few of them were built on Arm64. By relying on virtualization, K-Int interposes on all updates to the kernel page table and kernel code. Therefore, it prevents kernel code modification and malicious kernel page table manipulation. Since K-Int relies only on the basic hypervisor and Arm64’s features, it does not need the host hypervisor to provide complex implementations. In this sense, K-int is an extension that would be portable on hypervisors. K-Int leverages Arm virtualization extensions to protect Arm64 kernels. It is built upon SeKVM and reuses its formally verified functionality. The code base is composed of 4205 LoC and only 3 hypercalls to apply the protective layer. The implementation of K-Int over SeKVM suggests just a small overhead in performance at run time (e.g. < 2%).en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-10-24T16:52:56Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2023-10-24T16:52:56Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontentsAbstract i
Contents iii
List of Figures v
List of Table vi
1.Introduction 1
2.Design Goal and Threat Model 4
2.1 Design Goals and Challenges 4
2.2 Threat Model and Assumption 5
3. Background 6
3.1 Overview of Arm’s Architecture 6
3.2 Overview of SeKVM 10
4. K-Int Design 13
4.1 W⊕PX 14
4.2 Kernel page table protection 15
4.3 Kernel Code Integrity 19
4.4 Module Management 21
5. Implementation 23
5.1 Subownership 24
5.2 Static Protection 25
5.3 Kernel Page Table Protection 28
5.4 W⊕PX 31
5.5 Loadable Kernel Modules 32
5.6 DMA Protection 36
6. Evaluation 37
6.1 Performance 37
6.2 Discussion 40
6.2.1 Comparison with Linux existing protection mechanism 40
6.2.2 Protection against real-world attacks 41
6.3 Limitation 44
6.4 Future Work 45
7. Related Work 49
8. Conclusion 52
References 53
-
dc.language.isoen-
dc.subject虛擬機zh_TW
dc.subjectKVMzh_TW
dc.subject系統核心完整性zh_TW
dc.subject系統安全zh_TW
dc.subjectVirtualizationen
dc.subjectSystem Securityen
dc.subjectKernel Integrityen
dc.subjectKVMen
dc.titleK-Int, 作業系統核心完整性保護之執行器zh_TW
dc.titleK-Int, Kernel Code Integrity Enforceren
dc.typeThesis-
dc.date.schoolyear111-2-
dc.description.degree碩士-
dc.contributor.oralexamcommittee蕭旭君;黃俊穎zh_TW
dc.contributor.oralexamcommitteeHsu-Chun Hsiao;Chun-Ying Huangen
dc.subject.keyword系統安全,系統核心完整性,KVM,虛擬機,zh_TW
dc.subject.keywordSystem Security,Kernel Integrity,KVM,Virtualization,en
dc.relation.page56-
dc.identifier.doi10.6342/NTU202301655-
dc.rights.note未授權-
dc.date.accepted2023-08-07-
dc.contributor.author-college電機資訊學院-
dc.contributor.author-dept資訊網路與多媒體研究所-
顯示於系所單位:資訊網路與多媒體研究所

文件中的檔案:
檔案 大小格式 
ntu-111-2.pdf
  未授權公開取用
706.03 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved