This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Enforcing Mandatory Access Control in Commodity OS to Disable Malware
July-Aug. 2012 (vol. 9 no. 4)
pp. 540-554
Zhiyong Shan, Renmin University of China, Beijing
Xin Wang, Stony Brook University, Stony Brook
Tzi-cker Chiueh, Stony Brook University, Stony Brook
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusable problems in existing MAC systems. To address these issues, we manually analyze 2,600 malware samples one by one and two types of MAC enforced operating systems, and then design a novel MAC enforcement approach, named Tracer, which incorporates intrusion detection and tracing in a commercial operating system. The approach conceptually consists of three actions: detecting, tracing, and restricting suspected intruders. One novelty is that it leverages light-weight intrusion detection and tracing techniques to automate security label configuration that is widely acknowledged as a tough issue when applying a MAC system in practice. The other is that, rather than restricting information flow as a traditional MAC does, it traces intruders and restricts only their critical malware behaviors, where intruders represent processes and executables that are potential agents of a remote attacker. Our prototyping and experiments on Windows show that Tracer can effectively defeat all malware samples tested via blocking malware behaviors while not causing a significant compatibility problem.
Index Terms:
Access controls, operating system, invasive software, OS-level information flow.
Citation:
Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, "Enforcing Mandatory Access Control in Commodity OS to Disable Malware," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp. 540-554, July-Aug. 2012, doi:10.1109/TDSC.2012.36
Usage of this product signifies your acceptance of the Terms of Use.