Issue No. 02 - March-April (2014 vol. 11)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2013.29
Hussain M.J. Almohri , Virginia Tech, Blacksburg
Danfeng Yao , Virginia Tech, Blacksburg
Dennis Kafura , Virginia Tech, Blacksburg
This paper points out the need in modern operating system kernels for a process authentication mechanism, where a process of a user-level application proves its identity to the kernel. Process authentication is different from process identification. Identification is a way to describe a principal; PIDs or process names are identifiers for processes in an OS environment. However, the information such as process names or executable paths that is conventionally used by OS to identify a process is not reliable. As a result, malware may impersonate other processes, thus violating system assurance. We propose a lightweight secure application authentication framework in which user-level applications are required to present proofs at runtime to be authenticated to the kernel. To demonstrate the application of process authentication, we develop a system call monitoring framework for preventing unauthorized use or access of system resources. It verifies the identity of processes before completing the requested system calls. We implement and evaluate a prototype of our monitoring architecture in Linux. The results from our extensive performance evaluation show that our prototype incurs reasonably low overhead, indicating the feasibility of our approach for cryptographically authenticating applications and their processes in the operating system.
Authentication, Kernel, Monitoring, Runtime, Malware