DOPE: DOmain Protection Enforcement with PKS

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

The number of Linux kernel vulnerabilities discovered has increased drastically over the past years. In the kernel, even simple memory safety vulnerabilities can have devastating consequences, e.g., compromising the entire system. Efforts to mitigate these vulnerabilities have so far focused mainly on control-flow hijacking attacks in the kernel. Yet, data-oriented attacks remain largely unmitigated in practice as existing mitigations are limited in providing robust security guarantees at reasonable performance overhead for multiple sensitive data objects. In this paper, we present DOmain Protection Enforcement (DOPE), a novel kernel mitigation to protect against data-oriented attacks leveraging Intel's new hardware feature PKS. DOPE enforces domain protection, restricting memory access to sensitive data during kernel space execution based on the principle of least privilege. Hence, in case of an exploitable kernel bug, an attacker is prevented from using sensitive data for privilege escalation. We demonstrate DOPE's effectiveness and usefulness by implementing a proof-of-concept, protecting eight selected sensitive data objects. The proof-of-concept is realized as compiler-assisted and hardware-enforced kernel mitigation. It consists of less than 5000 lines of code on the Linux kernel 5.19 and LLVM clang 15.0.1. Our evaluation on real hardware shows an average runtime overhead of for real-world user applications. Lastly, we systematically analyze 11 state-of-the-art kernel mitigations against data-oriented attacks and illustrate that DOPE is a significant improvement in terms of security with respect to performance.

Originalspracheenglisch
TitelProceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023
Herausgeber (Verlag)Association of Computing Machinery
Seiten662-676
Seitenumfang15
ISBN (elektronisch)979-8-4007-0886-2
DOIs
PublikationsstatusVeröffentlicht - 4 Dez. 2023
Veranstaltung2023 Annual Computer Security Applications Conference: ACSAC 2023 - Austin, USA / Vereinigte Staaten
Dauer: 4 Dez. 20238 Dez. 2023

Publikationsreihe

NameACM International Conference Proceeding Series

Konferenz

Konferenz2023 Annual Computer Security Applications Conference
KurztitelACSAC 2023
Land/GebietUSA / Vereinigte Staaten
OrtAustin
Zeitraum4/12/238/12/23

ASJC Scopus subject areas

  • Software
  • Human-computer interaction
  • Maschinelles Sehen und Mustererkennung
  • Computernetzwerke und -kommunikation

Fingerprint

Untersuchen Sie die Forschungsthemen von „DOPE: DOmain Protection Enforcement with PKS“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren