Skip navigation
Please use this identifier to cite or link to this item: https://repository.esi-sba.dz/jspui/handle/123456789/750
Title: Control Flow Integrity in The Linux Kernel
Authors: BENCHIKH, ABdelouahab
Issue Date: 2024
Abstract: The Linux operating system is the backbone of countless devices, personal or otherwise, servers, etc. Making its security a paramount concern. Given the open source nature of the Linux Kernel, attackers and researchers alike have access to the very core of the Linux operating system, allowing them to dive deep into its internals and find and/or patch flaws therein. This work dives into the kernel, some components that are most prone targets to attackers, as well as common attacks, methods used to defend, and so on. With impenetrability in mind, CFI is introduced to the kernel, putting an end to a large portion of attacks that rely on control flow hijacking primitives, that have previously caused infinite damage to infrastructures, working environments, personal lives, etc. We discuss this protection and how it works in defending against the aforementioned fashion of attacks. We look at the way to bypass this protection, as a way to showcase the need for more protection, as ending the cycle of attack and defense here would only lead to more potential damage. *** Le syst`eme d’exploitation Linux est la colonne vert´ebrale d’innombrables appareils, qu’ils soient personnels ou non, de serveurs, etc., rendant sa s´ecurit´e d’une importance capitale. ´Etant donn´e la nature open source du noyau Linux, les attaquants comme les chercheurs ont acc`es au coeur mˆeme du syst`eme d’exploitation, leur permettant d’explorer ses entrailles et de d´ecouvrir et/ou de corriger les failles qu’il contient. Ce travail s’int´eresse au noyau, `a certains de ses composants les plus susceptibles d’ˆetre la cible d’attaques, ainsi qu’aux attaques courantes, aux m´ethodes de d´efense utilis´ees, etc. Avec l’inviolabilit´e en tˆete, la CFI (Control Flow Integrity) est introduite dans le noyau, mettant fin `a une grande partie des attaques qui reposent sur des primitives de d´etournement de flux de contrˆole, ayant auparavant caus´e d’innombrables d´egˆats aux infrastructures, aux environnements de travail, `a la vie priv´ee, etc. Nous discutons de cette protection et de son fonctionnement pour se d´efendre contre les types d’attaques mentionn´es ci-dessus. Nous examinons ensuite les moyens de contourner cette protection, afin de montrer la n´ecessit´e d’une protection accrue, car mettre fin au cycle d’attaque et de d´efense `a ce stade ne ferait que conduire `a des d´egˆats potentiels encore plus importants.
Description: Supervisor : Mr. Sidi Mohammed BENSLIMANE Co-Supervisor : Mr. Yan Shoshitaishvili
URI: https://repository.esi-sba.dz/jspui/handle/123456789/750
Appears in Collections:Master

Files in This Item:
File Description SizeFormat 
Master-edited-1-1.pdf79,81 kBAdobe PDFView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.