Back to Search Start Over

Reversing File Access Control Using Disk Forensics on Low-Level Flash Memory.

Authors :
Rother, Caleb
Chen, Bo
Source :
Journal of Cybersecurity & Privacy; Dec2024, Vol. 4 Issue 4, p805-822, 18p
Publication Year :
2024

Abstract

In the history of access control, nearly every system designed has relied on the operating system (OS) to enforce the access control protocols. However, if the OS (and specifically root access) is compromised, there are few if any solutions that can get users back into their system efficiently. In this work, we have proposed a novel approach that allows secure and efficient rollback of file access control after an adversary compromises the OS and corrupts the access control metadata. Our key observation is that the underlying flash memory typically performs out-of-place updates. Taking advantage of this unique feature, we can extract the "stale data" specific for OS access control, by performing low-level disk forensics over the raw flash memory. This allows efficiently rolling back the OS access control to a state pre-dating the compromise. To justify the feasibility of the proposed approach, we have implemented it in a computing device using file system EXT2/EXT3 and open-sourced flash memory firmware OpenNFM. We also evaluated the potential impact of our design on the original system. Experimental results indicate that the performance of the affected drive is not significantly impacted. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
2624800X
Volume :
4
Issue :
4
Database :
Complementary Index
Journal :
Journal of Cybersecurity & Privacy
Publication Type :
Academic Journal
Accession number :
181939792
Full Text :
https://doi.org/10.3390/jcp4040038