Securing the Operating System A Software Based Approach in Linux

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-50 Number-3
Year of Publication : 2017
Authors : Prabhav S, Madhav V Deshpande, Rakshak R Kamath, Rohan N, Rakesh Kumar, Latha N R
DOI :  10.14445/22312803/IJCTT-V50P123

MLA

Prabhav S, Madhav V Deshpande, Rakshak R Kamath, Rohan N, Rakesh Kumar, Latha N R "Securing the Operating System A Software Based Approach in Linux". International Journal of Computer Trends and Technology (IJCTT) V50(3):133-136, August 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Linux is one the most widely used operating systems. With its inherent ubiquity come its many flaws. In this implementation the aspect of system security is considered. We have implemented a kernel patch which isolates the execution of ELF files in Ubuntu. The signatures of these files are verified before the loading and execution can proceed. We verify the path of the file and its hash value. Any change in path or the contents of the file and hence change in its hash value will prevent it from being executed and hence a safe execution environment is provided. The kernel with the security patch takes an average of 0.006 seconds more time than the kernel without the patch which means the user of such a system will not feel any delays in execution.

References
[1] “The MD5 Message-Digest Algorithm” R.Rivest , MIT Laboratory for Computer Science and RSA Data Security, Inc. April 1992.
[2] AIX V6 Advanced Security Features Introduction and Configuration, 2007.
[3] ARM, "Security technology building a secure system using trustzone technology (white paper)." ARM Limited (2009).
[4] “Verifying System Integrity”, Sourabh Desai, George Koikara, Pruthvi Natarajan and Ravi Shankar, 2009 [5] Intel Trusted Execution technology: White paper 2012.
[6] FIPS, PUB. “180-4-Federal Information Processing Standards Publication-Secure Hash Standard (SHS)-National Institute of Standards and Technology Gaithersburg.” (2012): 20899-8900.
[7] Younan Y. “25 Years of Vulnerabilities: 1988-2012[J]”, Sourcefire Crop, 2013.
[8] “Overview of Linux Vulnerabilities”. International Conference on Soft Computing in Information Communication Technology (SCICT 2014)”.
[9] “Review paper on Secure Hashing Algorithm and its variants”,Priyanka Vadhera, Bhumika Lall, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064,2014.

Keywords
linux; kernel; system security; cryptographic hash.