2020
DOI: 10.1007/s10207-020-00514-7
|View full text |Cite
|
Sign up to set email alerts
|

Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes

Abstract: Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing in recent years. In particular, if administrator privileges are acquired by an attacker through a privilege escalation attack, the attacker can operate the entire system and cause serious damage. In this paper, we propose an additional kernel observer (AKO) that prevents privilege escalation attacks that exploit operating system vulnerabilities. We focus on the fact that a process privilege can be changed only … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 13 publications
(19 reference statements)
0
1
0
Order By: Relevance
“…Kernel control flow integrity (KCoFI) inspects the order of code execution [7] to restrict the kernel code from being illegally invoked [8]. Kernel address space layout randomization (KASLR) randomizes the virtual addresses of the kernel code and kernel data in the kernel memory space to foil attacks [9], whereas the additional kernel observer (AKO) detects unintentional rewriting in response to the changes in the privileged information of user processes against a privilege escalation attack [10].…”
Section: Introductionmentioning
confidence: 99%
“…Kernel control flow integrity (KCoFI) inspects the order of code execution [7] to restrict the kernel code from being illegally invoked [8]. Kernel address space layout randomization (KASLR) randomizes the virtual addresses of the kernel code and kernel data in the kernel memory space to foil attacks [9], whereas the additional kernel observer (AKO) detects unintentional rewriting in response to the changes in the privileged information of user processes against a privilege escalation attack [10].…”
Section: Introductionmentioning
confidence: 99%