Online self-diagnosis self-recovery infrastructure for embedded systems

Lei Sun*, Tatsuo Nakajima

*この研究の対応する著者

研究成果: Article査読

1 被引用数 (Scopus)

抄録

Complexity of monolithic kernel of existing operating systems results in security exploits inevitably. When it is compromised, manual recovery from kernel-level attacks is usually time-consuming. The whole process is expected to be automatic and supported in system level. The requirement becomes more necessary for modern embedded systems, which lack such administrative and recovery tools for end users comparing with PC. We implement a prototype system called OSKROD to support system automatic recovery. OSKROD can take a collection of actions to recover infected kernel, after detecting kernel-level attacks infections based on system virtualization technique. Moreover, it can operate in two working modes: periodic mode and request-service mode, which can be fit in various application scenarios. Its recovery has been proved effective in fault injection experiments against real world attacks. The results indicate that it can correctly detect several kernel-level security attacks and recover the system with acceptable penalty to system performance.

本文言語English
ページ(範囲)39-52
ページ数14
ジャーナルInternational Journal of Security and its Applications
4
4
出版ステータスPublished - 2010 12月 1

ASJC Scopus subject areas

  • コンピュータサイエンス一般

フィンガープリント

「Online self-diagnosis self-recovery infrastructure for embedded systems」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル