Document Type
Article
Publication Date
10-1-2024
Department
Department of Computer Science
Abstract
In the history of access control, nearly every system designed has relied on the operating system (OS) to enforce the access control protocols. However, if the OS (and specifically root access) is compromised, there are few if any solutions that can get users back into their system efficiently. In this work, we have proposed a novel approach that allows secure and efficient rollback of file access control after an adversary compromises the OS and corrupts the access control metadata. Our key observation is that the underlying flash memory typically performs out-of-place updates. Taking advantage of this unique feature, we can extract the “stale data” specific for OS access control, by performing low-level disk forensics over the raw flash memory. This allows efficiently rolling back the OS access control to a state pre-dating the compromise. To justify the feasibility of the proposed approach, we have implemented it in a computing device using file system EXT2/EXT3 and open-sourced flash memory firmware OpenNFM. We also evaluated the potential impact of our design on the original system. Experimental results indicate that the performance of the affected drive is not significantly impacted.
Publication Title
Journal of Cybersecurity and Privacy
Recommended Citation
Rother, C. J.,
&
Chen, B.
(2024).
Reversing File Access Control Using Disk Forensics on Low-Level Flash Memory.
Journal of Cybersecurity and Privacy,
4(4), 805-822.
http://doi.org/10.3390/jcp4040038
Retrieved from: https://digitalcommons.mtu.edu/michigantech-p2/1248
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Version
Publisher's PDF
Publisher's Statement
Copyright: © 2024 by the authors. Licensee MDPI, Basel, Switzerland. Publisher’s version of record: https://doi.org/10.3390/jcp4040038