• DocumentCode
    2963147
  • Title

    A methodology for finding source-level vulnerabilities of the Linux kernel variables

  • Author

    Kim, Jaewang ; Lee, Jee-Hyong

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Sungkyunkwan Univ., Suwon
  • fYear
    2008
  • fDate
    1-8 June 2008
  • Firstpage
    3717
  • Lastpage
    3722
  • Abstract
    Linux kernel provides several advantages to system developers and is widely used as an operating system in a variety of systems, including embedded systems, access routers and servers. These advantages are due to the fact that the Linux kernel is publicly available, however, this feature of openness can have negative impacts on system security. If an attacker wished to exploit Linux-based systems, the attacker could easily do so by finding and abusing the vulnerabilities of the systemspsila Linux kernel sources. There are several methods available that can find source-level vulnerabilities, but they are not always suitable for the Linux kernel. In this paper, we propose a two-step Onion mechanism as a methodology to find source-level vulnerabilities of the Linux kernel variables. The first step of the Onion mechanism is to select variables that may be vulnerable by exploiting their usage patterns. The second step is to inspect the vulnerabilities of the selected variables by making and analyzing system call trees. We also evaluate our proposed methodology by applying it to two well-known source-level vulnerabilities.
  • Keywords
    Linux; operating system kernels; security of data; Linux kernel variable; Onion mechanism; source-level vulnerability; Kernel; Linux; Neural networks; Pattern analysis; Pattern matching;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference on
  • Conference_Location
    Hong Kong
  • ISSN
    1098-7576
  • Print_ISBN
    978-1-4244-1820-6
  • Electronic_ISBN
    1098-7576
  • Type

    conf

  • DOI
    10.1109/IJCNN.2008.4634331
  • Filename
    4634331