Downloads: 1 | Views: 311 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Information Security | India | Volume 11 Issue 2, February 2022 | Popularity: 4.9 / 10
Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication
Ujas Dhami, Nisarg Shah
Abstract: The monolithic kernel is a widely used kernel when building ARM architectures and Linux distributions. With all instructions being in the kernel space, it is insecure, and can easily perform cross-transactions of sensitive information when under a memory leak, thus, it is vital to lock certain sections of the kernel to confine it from exposing personal information to risk. Investigation: This paper demonstrates a Volatile Operating System formulated by the authors with the use of Keyring Subsystems for fragmenting the kernel space into multiple domes using security keys. Method: A kernel is configured and built using security modules, and deployed with anonymization tools to a bootable USB, to check if memory leaks leave traces of cache into the device drivers or the disk. These anonymization tools help to clear memory. Principle Result: Less to no information was transmitted to the device memory, leaving everything as is. The anonymization tools cleared off all the events and cache before shutting down the system, making it challenging for forensics to acknowledge the use of a volatile OS into the device from a USB stick.
Keywords: Operating System, OS Development, Monolithic Kernel, Kernel Security and Anonymity, Anonymization
Edition: Volume 11 Issue 2, February 2022
Pages: 148 - 151
DOI: https://www.doi.org/10.21275/SR22131160746
Make Sure to Disable the Pop-Up Blocker of Web Browser