Operating system security by integrity checking and recovery using write-protected storage

12Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

An integrity checking and recovery (ICAR) system is presented here, which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write-protected storage to eliminate the threat of unauthorised modification. A buffering mechanism was designed and implemented in the system to increase operation performance. Additionally, the system supplies user tools for cryptographic hash generation and security database management. The system is implemented as a kernel extension, compliant with the Linux security model. Experimental evaluation of the system was performed and showed an approximate 10% performance degradation in secured file access compared to regular access. © The Institution of Engineering and Technology 2014.

Cite

CITATION STYLE

APA

Kaczmarek, J., & Wrobel, M. R. (2014). Operating system security by integrity checking and recovery using write-protected storage. IET Information Security, 8(2), 122–131. https://doi.org/10.1049/iet-ifs.2012.0346

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free