Back to Search
Start Over
Reversing File Access Control Using Disk Forensics on Low-Level Flash Memory.
- Source :
- Journal of Cybersecurity & Privacy; Dec2024, Vol. 4 Issue 4, p805-822, 18p
- Publication Year :
- 2024
-
Abstract
- In the history of access control, nearly every system designed has relied on the operating system (OS) to enforce the access control protocols. However, if the OS (and specifically root access) is compromised, there are few if any solutions that can get users back into their system efficiently. In this work, we have proposed a novel approach that allows secure and efficient rollback of file access control after an adversary compromises the OS and corrupts the access control metadata. Our key observation is that the underlying flash memory typically performs out-of-place updates. Taking advantage of this unique feature, we can extract the "stale data" specific for OS access control, by performing low-level disk forensics over the raw flash memory. This allows efficiently rolling back the OS access control to a state pre-dating the compromise. To justify the feasibility of the proposed approach, we have implemented it in a computing device using file system EXT2/EXT3 and open-sourced flash memory firmware OpenNFM. We also evaluated the potential impact of our design on the original system. Experimental results indicate that the performance of the affected drive is not significantly impacted. [ABSTRACT FROM AUTHOR]
- Subjects :
- FLASH memory
SYSTEMS design
METADATA
Subjects
Details
- Language :
- English
- ISSN :
- 2624800X
- Volume :
- 4
- Issue :
- 4
- Database :
- Complementary Index
- Journal :
- Journal of Cybersecurity & Privacy
- Publication Type :
- Academic Journal
- Accession number :
- 181939792
- Full Text :
- https://doi.org/10.3390/jcp4040038