Securing Operating Systems Through Fine-grained Kernel Access Limitation for IoT Systems
By: Dongyang Zhan , Zhaofeng Yu , Xiangzhan Yu and more
Potential Business Impact:
Secures small computers by blocking bad commands.
With the development of Internet of Things (IoT), it is gaining a lot of attention. It is important to secure the embedded systems with low overhead. The Linux Seccomp is widely used by developers to secure the kernels by blocking the access of unused syscalls, which introduces less overhead. However, there are no systematic Seccomp configuration approaches for IoT applications without the help of developers. In addition, the existing Seccomp configuration approaches are coarse-grained, which cannot analyze and limit the syscall arguments. In this paper, a novel static dependent syscall analysis approach for embedded applications is proposed, which can obtain all of the possible dependent syscalls and the corresponding arguments of the target applications. So, a fine-grained kernel access limitation can be performed for the IoT applications. To this end, the mappings between dynamic library APIs and syscalls according with their arguments are built, by analyzing the control flow graphs and the data dependency relationships of the dynamic libraries. To the best of our knowledge, this is the first work to generate the fine-grained Seccomp profile for embedded applications.
Similar Papers
Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation
Cryptography and Security
Makes computer programs safer from hackers.
Playing in the Sandbox: A Study on the Usability of Seccomp
Operating Systems
Makes apps safer by limiting what they can do.
Locking Down Science Gateways
Software Engineering
Keeps computer programs safer by limiting what they can do.