An integrity checking and recovery (ICAR) system is presented here, which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write-protected storage to eliminate the threat of unauthorised modification. A buffering mechanism was designed and implemented in the system to increase operation performance. Additionally, the system supplies user tools for cryptographic hash generation and security database management. The system is implemented as a kernel extension, compliant with the Linux security model. Experimental evaluation of the system was performed and showed an approximate 10% performance degradation in secured file access compared to regular access. © The Institution of Engineering and Technology 2014.
CITATION STYLE
Kaczmarek, J., & Wrobel, M. R. (2014). Operating system security by integrity checking and recovery using write-protected storage. IET Information Security, 8(2), 122–131. https://doi.org/10.1049/iet-ifs.2012.0346
Mendeley helps you to discover research relevant for your work.