Analyzing the Overhead of Filesystem Protection Using Linux Security Modules

01/27/2021
by   Wenhui Zhang, et al.
0

Over the years, the complexity of the Linux Security Module (LSM) is keeping increasing, and the count of the authorization hooks is nearly doubled. It is important to provide up-to-date measurement results of LSM for system practitioners so that they can make prudent trade-offs between security and performance. This work evaluates the overhead of LSM for file accesses on Linux v5.3.0. We build a performance evaluation framework for LSM. It has two parts, an extension of LMBench2.5 to evaluate the overhead of file operations for different security modules, and a security module with tunable latency for policy enforcement to study the impact of the latency of policy enforcement on the end-to-end latency of file operations. In our evaluation, we find opening a file would see about 87 integrated with SELinux hooks (policy enforcement disabled) than without, while the figure was 27 downgrade is affected by two parts, policy enforcement and hook placement. To further investigate the impact of policy enforcement and hook placement respectively, we build a Policy Testing Module, which reuses hook placements of LSM, while alternating latency of policy enforcement. With this module, we are able to quantitatively estimate the impact of the latency of policy enforcement on the end-to-end latency of file operations by using a multiple linear regression model and count policy authorization frequencies for each syscall. We then discuss and justify the evaluation results with static analysis on our enhanced syscalls' call graphs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/13/2013

Performance Evaluation of Java File Security System (JFSS)

Security is a critical issue of the modern file and storage systems, it ...
research
08/14/2021

A Policy-based Versioning SSD with Intel SGX

Privileged malware neutralizes software-based versioning systems and des...
research
08/03/2018

A Stochastic Model for File Lifetime and Security in Data Center Networks

Data center networks are an important infrastructure in various applicat...
research
05/29/2023

Securing Cloud File Systems using Shielded Execution

Cloud file systems offer organizations a scalable and reliable file stor...
research
05/20/2020

NR V2X Communications at Millimeter Waves: An End-to-End Performance Evaluation

3GPP NR V2X represents the new 3GPP standard for next-generation vehicul...
research
10/26/2021

Exploring eFPGA-based Redaction for IP Protection

Recently, eFPGA-based redaction has been proposed as a promising solutio...
research
01/20/2022

Polytope: Practical Memory Access Control for C++ Applications

Designing and implementing secure software is inarguably more important ...

Please sign up or login with your details

Forgot password? Click here to reset