Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Preventing Kernel Hacks with HAKC
 
conference paper

Preventing Kernel Hacks with HAKC

McKee, Derrick
•
Giannaris, Yianni
•
Perez, Carolina Ortega
Show more
2022
29th Annual Network and Distributed System Security Symposium, NDSS 2022
29 Network and Distributed System Security Symposium

Commodity operating system kernels remain monolithic for practical and historical reasons. All kernel code shares a single address space, executes with elevated processor privileges, and has largely unhindered access to all data, including data irrelevant to the completion of a specific task. Applying the principle of least privilege, which limits available resources only to those needed to perform a particular task, to compartmentalize the kernel would realize major security gains, similar to microkernels yet without the major redesign effort. Here, we introduce a compartmentalization design, called a Hardware-Assisted Kernel Compartmentalization (HAKC), that approximates least privilege separation, while minimizing both developer effort and performance overhead. HAKC divides code and data into separate partitions, and specifies an access policy for each partition. Data is owned by a single partition, and a partition's access-control policy is enforced at runtime, preventing unauthorized data access. When a partition needs to transfer control flow to outside itself, data ownership is transferred to the target, and transferred back upon return. The HAKC design allows for isolating code and data from the rest of the kernel, without utilizing any additional Trusted Computing Base while compartmentalized code is executing. Instead, HAKC relies on hardware for enforcement. Loadable kernel modules (LKMs), which dynamically load kernel code and data providing specialized functionality, are the single largest part of the Linux source base. Unfortunately, their collective size and complexity makes LKMs the cause of the majority of CVEs issued for the Linux kernel. The combination of a large attack surface in kernel modules, and the monolithic design of the Linux kernel, make LKMs ideal candidates for compartmentalization. To demonstrate the effectiveness of our approach, we implement HAKC in Linux v5.10 using extensions to the Arm v8.5-A ISA, and compartmentalize the ipv6.ko LKM, which consists of over 55k LOC. The average overhead measured in Apachebench tests was just 1.6%-24%. Additionally, we compartmentalize the nf_tables.ko packet filtering LKM, and measure the combined impact of using both LKMs. We find a reasonable linear growth in overhead when both compartmentalized LKMs are used. Finally, we measure no significant difference in performance when using the compartmentalized ipv6.ko LKM over the unmodified LKM during real-world web browsing experiments on the Alexa Top 50 websites.

  • Details
  • Metrics
Type
conference paper
DOI
10.14722/ndss.2022.24026
Scopus ID

2-s2.0-85180549829

Author(s)
McKee, Derrick

Purdue University

Giannaris, Yianni

MIT Computer Science & Artificial Intelligence Laboratory

Perez, Carolina Ortega

MIT Computer Science & Artificial Intelligence Laboratory

Shrobe, Howard

MIT Computer Science & Artificial Intelligence Laboratory

Payer, Mathias  

École Polytechnique Fédérale de Lausanne

Okhravi, Hamed

Lincoln Laboratory

Burow, Nathan

Lincoln Laboratory

Date Issued

2022

Publisher

The Internet Society

Published in
29th Annual Network and Distributed System Security Symposium, NDSS 2022
ISBN of the book

1891562746

9781891562747

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
HEXHIVE  
Event nameEvent acronymEvent placeEvent date
29 Network and Distributed System Security Symposium

Hybrid, San Diego, United States

2022-04-24 - 2022-04-28

FunderFunding(s)Grant NumberGrant URL

European Research Council

Under Secretary of Defense for Research and Engineering

European Union's Horizon 2020 research and innovation program

Show more
Available on Infoscience
April 4, 2025
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/248573
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés