DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2013.29
Hussain M.J. Almohri , Virginia Tech, Blacksburg
Danfeng Daphne Yao , Virginia Tech, Blacksburg
Dennis Kafura , Virginia Tech, Blacksburg
This paper points out the need in modern operating system kernels for a process authentication mechanism, where a process of a user-level application proves its identity to the kernel. Process authentication is different from process identification. Identification is a way to describe a principal; PIDs or process names are identifiers for processes in an OS environment. However, the information such as process names or executable paths that is conventionally used by OS to identify a process is not reliable. As a result, malware may impersonate other processes, thus violating system assurance. We propose a lightweight secure application authentication system in which user-level applications are required to present proofs at run time to be authenticated to the kernel. To demonstrate the application of process authentication, we develop a system call monitoring framework for preventing unauthorized use or access of system resources. It verifies the identity of processes before completing the requested system calls. We implement and evaluate a prototype of our monitoring architecture in Linux. The results from our extensive performance evaluation shows that our prototype incurs reasonably low overhead, indicating the feasibility of our approach for cryptographically authenticating applications and their processes in the operating system.
Authentication, Kernel, Monitoring, Runtime, Malware, system call monitoring, operating system security, process authentication, application credential
H. M. Almohri, D. D. Yao and D. Kafura, "Process Authentication for High System Assurance," in IEEE Transactions on Dependable and Secure Computing.