Architectural Design for a Secure Linux Operating System

被引:0
|
作者
Narayanan, Hari [1 ]
Radhakrishnan, Vivek [1 ]
Shiju-Sathyadevan [1 ]
Poroor, Jayaraj [2 ]
机构
[1] Amrita Univ, Amrita Ctr Cybersecur Syst & Networks, Amrita Sch Engn, Amrita Vishwa Vidyapeetham, Amritapuri, India
[2] EnergiMate, Gandhinagar, Gujarat, India
关键词
Linux; authorization; principle of least privilege; security ticket; sandbox;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Operating system security is a hot research area for the past several decades. Various security mechanisms have been introduced till now to secure the operating system. In this paper we are focusing on securing Linux operating system. Even though Linux is open source and large numbers of people are involved in developing kernel patches for security holes, there are still many malwares to exploit the existing vulnerabilities. Using our architecture we are trying to minimize the damage done by the malwares if not blocking them altogether. Our architecture is designed to ensure the principle of least privilege. Principle of least privilege guarantees that a process will get the privileges just enough to perform its task. This ensures that even if the process is compromised it can do the least damage to the system as it is running in a sandbox. Major chunk of our system is running in the user level to make it portable across the distributions. Our system uses a specially structured security ticket to provide fine grained authorization to user processes which is not currently possible in the traditional linux architecture. The security ticket is designed in such a way that it can be inherited by a child process, can be shared and is unforgeable. The core module in the system is called Secd (Secure Daemon) which authorizes all the requests and also manages the security tickets.
引用
收藏
页码:949 / 953
页数:5
相关论文
共 50 条
  • [41] Draco: Architectural and Operating System Support for System Call Security
    Skarlatos, Dimitrios
    Chen, Qingrong
    Chen, Jianyan
    Xu, Tianyin
    Torrellas, Josep
    2020 53RD ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO 2020), 2020, : 42 - 57
  • [42] An Architectural Framework for the Development of Secure Mobile Payment System
    Britto, S.
    Kumar, R.
    Rabara, S. Albert
    JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2010, 4 (04) : 443 - 462
  • [43] A secure operating system for data centers: A survey
    Ejaz, Sikandar
    Iqbal, Muhammad Javed
    Bibi, Hafsa
    Pervez, Shahbaz
    Al-Dhlan, Kawther A.
    Hosseini, Seyed Ebrahim
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2020, 7 (08): : 53 - 64
  • [44] InkTag: Secure Applications on an Untrusted Operating System
    Hofmann, Owen S.
    Kim, Sangman
    Dunn, Alan M.
    Lee, Michael Z.
    Witchel, Emmett
    ACM SIGPLAN NOTICES, 2013, 48 (04) : 265 - 278
  • [45] NOSArmor: Building a Secure Network Operating System
    Jo, Hyeonseong
    Nam, Jaehyun
    Shin, Seungwon
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [46] Experimental Study on the Use of Compound System Calls in the Linux Operating System
    Matias, Rivalino, Jr.
    Sobrinho, Elder V. P.
    Araujo, Lucio B.
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 410 - 414
  • [47] A policy flexible architecture for secure operating system
    Zhiqiang, Lin
    Chao, Wang
    Bing, Mao
    Li, Xie
    Operating Systems Review (ACM), 2005, 39 (03): : 24 - 33
  • [48] Self-reconfigurable secure file system for embedded Linux
    Pedraza, C.
    Castillo, J.
    Martinez, J. I.
    Huerta, P.
    de la Lama, C. S.
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2008, 2 (06): : 461 - 470
  • [49] SYMBOL AND SYSTEM IN ARCHITECTURAL DESIGN
    MARCONI, P
    RICERCHE DI STORIA DELL ARTE, 1986, (27) : 5 - 5
  • [50] Design of secure operating systems with high security levels
    Qing Sihan
    Shen ChangXiang
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 399 - 418