Understanding Linux kernel vulnerabilities

被引:4
作者
Shameli-Sendi, Alireza [1 ]
机构
[1] Shahid Beheshti Univ SBU, Fac Comp Sci & Engn, Tehran, Iran
关键词
Software security; Linux kernel vulnerability; Vulnerability taxonomies; TAXONOMY;
D O I
10.1007/s11416-021-00379-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting the Linux kernel from malicious activities is of paramount importance. Several approaches have been proposed to analyze kernel-level vulnerabilities. Existing studies, however, have a strong focus on the attack type (e.g., buffer overflow). In this paper, we report on our analysis of 1,858 Linux kernel vulnerabilities covering a period of Jan 2010-Jan 2020. We classify these vulnerabilities from the attacker's view using various criteria such as the attacker's objective, the targeted subsystems of the kernel, the location from which vulnerabilities can be exploited (i.e., locally or remotely), the impact of the attack on confidentiality, system integrity and availability, and the complexity level associated with exploiting vulnerabilities. Our findings indicate the presence of a large number of low-complexity vulnerabilities. Most of them can be exploited from the local system, leading to attacks that can severely compromise the kernel quality of service, and allow attackers to gain privileged access
引用
收藏
页码:265 / 278
页数:14
相关论文
共 50 条
  • [31] A Combinatorial Approach to Detecting Buffer Overflow Vulnerabilities
    Wang, Wenhua
    Lei, Yu
    Liu, Donggang
    Kung, David
    Csallner, Christoph
    Zhang, Dazhi
    Kacker, Raghu
    Kuhn, Rick
    2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 269 - 278
  • [33] Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study
    Alves, Henrique
    Fonseca, Baldoino
    Antunes, Nuno
    2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016), 2016, : 37 - 44
  • [34] Modelling and predicting software vulnerabilities using a sigmoid function
    Iqbal J.
    Firdous T.
    Shrivastava A.K.
    Saraf I.
    International Journal of Information Technology, 2022, 14 (2) : 649 - 655
  • [35] An Empirical Investigation of Security Vulnerabilities within Web Applications
    Abunadi, Ibrahim
    Alenezi, Mamdouh
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2016, 22 (04) : 537 - 551
  • [36] SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS
    Medeiros, Iberia
    Beatriz, Miguel
    Neves, Nuno
    Correia, Miguel
    IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (03) : 1168 - 1188
  • [37] A Study on Web Application Security and Detecting Security Vulnerabilities
    Kumar, Sandeep
    Mahajan, Renuka
    Kumar, Naresh
    Khatri, Sunil Kumar
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 451 - 455
  • [38] A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
    Noor, Mohd Azeem Faizi
    Mustafa, Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (19)
  • [39] An Approach to Cognitive Root Cause Analysis of Software Vulnerabilities
    Hytopoulos, Theo
    Chan, Marvin
    Roth, Keegan
    Wasson, Rylan
    Huang, Fuqun
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROFES 2024, 2025, 15452 : 11 - 26
  • [40] OpenSCV: an open hierarchical taxonomy for smart contract vulnerabilities
    Vidal, Fernando Richter
    Ivaki, Naghmeh
    Laranjeiro, Nuno
    EMPIRICAL SOFTWARE ENGINEERING, 2024, 29 (04)