Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles 2011
DOI: 10.1145/2043556.2043568
|View full text |Cite
|
Sign up to set email alerts
|

Software fault isolation with API integrity and multi-principal modules

Abstract: The security of many applications relies on the kernel being secure, but history suggests that kernel vulnerabilities are routinely discovered and exploited. In particular, exploitable vulnerabilities in kernel modules are common. This paper proposes LXFI, a system which isolates kernel modules from the core kernel so that vulnerabilities in kernel modules cannot lead to a privilege escalation attack. To safely give kernel modules access to complex kernel APIs, LXFI introduces the notion of API integrity, whic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 76 publications
(49 citation statements)
references
References 23 publications
(13 reference statements)
0
49
0
Order By: Relevance
“…JavaScript to Java interface vulnerability that allows entrusted JavaScript which via sandbox can allow remote code execution and it causes root access in Android phones [5]. For irregular kernel interface especially in Linux, LXFI can introduce privilege escalation vulnerability [6]. API's have common vulnerability that we have shown in the introduction [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…JavaScript to Java interface vulnerability that allows entrusted JavaScript which via sandbox can allow remote code execution and it causes root access in Android phones [5]. For irregular kernel interface especially in Linux, LXFI can introduce privilege escalation vulnerability [6]. API's have common vulnerability that we have shown in the introduction [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Because many memory corruption vulnerabilities are found in third-party kernel drivers due to relatively low code quality, many previous works focused on confining the memory access capabilities of these untrusted code with SFI [16,25,43,63]. A major limitation of SFI, as pointed out by [18], is that the core kernel may also contain many bugs, which cannot be handled by SFI.…”
Section: Related Workmentioning
confidence: 99%
“…Some technologies are capable of preventing non-controldata attacks. For example, software fault isolation (SFI) [16,25,43,63] can be used to isolate small "untrusted" modules from tampering the core kernel components. However, a recent study on Linux kernel vulnerabilities [18] discovered that vulnerabilities in the core components are as common as vulnerabilities in third-party drivers.…”
Section: Introductionmentioning
confidence: 99%
“…Vx32 [6] uses the segment register in x86 to confine memory access in hardware. Other solutions [3,10,15] provide isolation by confining the untrusted component to a memory region assigned to the component, we call such a memory model as a separated memory model. There are two problems with this model.…”
Section: Related Workmentioning
confidence: 99%