Visible to the public Operating system security by integrity checking and recovery using write-protected storage

TitleOperating system security by integrity checking and recovery using write-protected storage
Publication TypeJournal Article
Year of Publication2014
AuthorsKaczmarek, J., Wrobel, M.R.
JournalInformation Security, IET
Volume8
Pagination122-131
Date PublishedMarch
ISSN1751-8709
Keywordsbuffering mechanism, cryptographic hashes generation, database management systems, file backups, file system integrity, hashes database, ICAR system binaries, integrity checking and recovery system, Linux, Linux security model, security constraints, security database management, security of data, system security, unauthorised modification, write-protected storage
Abstract

An integrity checking and recovery (ICAR) system is presented here, which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write-protected storage to eliminate the threat of unauthorised modification. A buffering mechanism was designed and implemented in the system to increase operation performance. Additionally, the system supplies user tools for cryptographic hash generation and security database management. The system is implemented as a kernel extension, compliant with the Linux security model. Experimental evaluation of the system was performed and showed an approximate 10% performance degradation in secured file access compared to regular access.

URLhttp://ieeexplore.ieee.org/document/6748546/?reload=true
DOI10.1049/iet-ifs.2012.0346
Citation Key6748546