Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing

Zhiyong Shan, Xin Wang, T. Chiueh
{"title":"Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing","authors":"Zhiyong Shan, Xin Wang, T. Chiueh","doi":"10.1145/1966913.1966932","DOIUrl":null,"url":null,"abstract":"Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusable problems in existing MAC systems. To address these issues, we start our work by analyzing the technical details of 2,600 malware samples one by one and performing experiments over two types of MAC enforced operating systems. Based on the preliminary studies, we design a novel MAC model incorporating intrusion detection and tracing in a commercial operating system, named Tracer, in order to disable malware on hosts while offering good compatibility to existing software and good usability to common users who are not system experts. The model conceptually consists of three actions: detecting, tracing and restricting suspected intruders. One novelty is that it leverages light-weight intrusion detection and tracing techniques to automate security label configuration that is widely acknowledged as a tough issue when applying a MAC system in practice. The other is that, rather than restricting information flow as a traditional MAC does, it traces intruders and restricts only their critical malware behaviors, where intruders represent processes and executables that are potential agents of a remote attacker. Our prototyping and experiments on Windows show that Tracer can effectively defeat all malware samples tested via blocking malware behaviors while not causing a significant compatibility problem.","PeriodicalId":72308,"journal":{"name":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asia CCS '22 : proceedings of the 2022 ACM Asia Conference on Computer and Communications Security : May 30-June 3, 2022, Nagasaki, Japan. ACM Asia Conference on Computer and Communications Security (17th : 2022 : Nagasaki-shi, Japan ; ...","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1966913.1966932","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

Abstract

Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusable problems in existing MAC systems. To address these issues, we start our work by analyzing the technical details of 2,600 malware samples one by one and performing experiments over two types of MAC enforced operating systems. Based on the preliminary studies, we design a novel MAC model incorporating intrusion detection and tracing in a commercial operating system, named Tracer, in order to disable malware on hosts while offering good compatibility to existing software and good usability to common users who are not system experts. The model conceptually consists of three actions: detecting, tracing and restricting suspected intruders. One novelty is that it leverages light-weight intrusion detection and tracing techniques to automate security label configuration that is widely acknowledged as a tough issue when applying a MAC system in practice. The other is that, rather than restricting information flow as a traditional MAC does, it traces intruders and restricts only their critical malware behaviors, where intruders represent processes and executables that are potential agents of a remote attacker. Our prototyping and experiments on Windows show that Tracer can effectively defeat all malware samples tested via blocking malware behaviors while not causing a significant compatibility problem.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
跟踪器:通过支持轻量级入侵检测和跟踪,在商用操作系统中强制执行访问控制
在商业操作系统中实施实用的强制访问控制(MAC)来解决恶意软件问题是一个巨大的挑战,但也是一个很有前途的方法。应用MAC来击败恶意软件程序的最大障碍是现有MAC系统中的不兼容和不可用问题。为了解决这些问题,我们通过逐一分析2600个恶意软件样本的技术细节并在两种类型的MAC强制操作系统上进行实验来开始我们的工作。在初步研究的基础上,我们设计了一种新的MAC模型,在商业操作系统中结合入侵检测和跟踪,命名为Tracer,以禁用主机上的恶意软件,同时为现有软件提供良好的兼容性,并为非系统专家的普通用户提供良好的可用性。该模型从概念上包括三个动作:检测、跟踪和限制可疑的入侵者。一个新颖之处在于,它利用轻量级入侵检测和跟踪技术来自动化安全标签配置,这在实际应用MAC系统时被广泛认为是一个棘手的问题。另一个优点是,它不像传统MAC那样限制信息流,而是跟踪入侵者并只限制他们的关键恶意软件行为,其中入侵者代表进程和可执行文件,这些进程和可执行文件是远程攻击者的潜在代理。我们在Windows上的原型和实验表明,Tracer可以通过阻止恶意软件行为有效地击败所有被测试的恶意软件样本,同时不会导致严重的兼容性问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Enabling Attribute-Based Access Control in Linux Kernel. Verbal, visual, and verbal-visual puns in translation: cognitive multimodal analysis Impoliteness in parliamentary discourse: a cognitive-pragmatic and sociocultural approach The functions of heraldic symbols in the English fiction Possible worlds of a literary text character: a cognitive and quantitative linguistic approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1