417 research outputs found

    Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes

    Get PDF
    Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing in recent years. In particular, if administrator privileges are acquired by an attacker through a privilege escalation attack, the attacker can operate the entire system and cause serious damage. In this paper, we propose an additional kernel observer (AKO) that prevents privilege escalation attacks that exploit operating system vulnerabilities. We focus on the fact that a process privilege can be changed only by specific system calls. AKO monitors privilege information changes during system call processing. If AKO detects a privilege change after system call processing, whereby the invoked system call does not originally change the process privilege, AKO regards the change as a privilege escalation attack and applies countermeasures against it. AKO can therefore prevent privilege escalation attacks. Introducing the proposed method in advance can prevent this type of attack by changing any process privilege that was not originally changed in a system call, regardless of the vulnerability type. In this paper, we describe the design and implementation of AKO for Linux x86 64-bit. Moreover, we show that AKO can be expanded to prevent the falsification of various data in the kernel space. Then, we present an expansion example that prevents the invalidation of Security-Enhanced Linux. Finally, our evaluation results show that AKO is effective against privilege escalation attacks, while maintaining low overhead

    Effects of the trunk position on muscle stiffness that reflects elongation of the lumbar erector spinae and multifidus muscles: an ultrasonic shear wave elastography study.

    Get PDF
    PURPOSE: The present study aimed to clarify the effects of the trunk position on muscle stiffness that reflects elongation of the lumbar erector spinae and lumbar multifidus muscles using ultrasonic shear wave elastography (SWE). METHODS: The study included ten healthy men. The shear elastic modulus of the left lumbar erector spinae and lumbar multifidus muscles were evaluated using ultrasonic SWE. Measurement postures for the left lumbar erector spinae muscle were (1) prone position (Rest), (2) sitting position with the trunk flexed (Flexion), (3) the Flexion position adding right trunk lateral flexion (Flexion-Lateral Flexion), and (4) the Flexion position adding right trunk rotation (Flexion-Rotation 1). The left lumbar multifidus muscle were measured in positions (1)-(3), and (5) the Flexion position adding left trunk rotation (Flexion-Rotation 2). RESULTS: The shear elastic modulus of the lumbar erector spinae muscle in the Flexion-Lateral Flexion position was significantly higher than that in the Rest, Flexion, or Flexion-Rotation 1 positions. Shear elastic modulus of the lumbar multifidus muscle was similar in the Flexion, Flexion-Lateral Flexion, and Flexion-Rotation 2 positions, but significantly lower in the Rest position. CONCLUSIONS: The results of the present study suggest that the lumbar erector spinae muscle is stretched effectively in the position adding trunk contralateral lateral flexion to flexion. The results also indicate that the lumbar multifidus muscle, which does not appear to be affected by adding trunk contralateral lateral flexion or ipsilateral rotation to flexion, is stretched effectively in the trunk flexion position

    Behavioural Models of Motor Control and Short-Term Memory

    Get PDF
    We examined in this review article the behavioural and conceptual models of motor control and short-term memory which have intensively been investigated since the 1970s. First, we reviewed both the dual-storage model of short-term memory in which movement information is stored and a typical model of motor control which emphasizes the importance of efferent factors. We then examined two models of preselection effects: a cognitive model and a cognitive/ efferent model. Following this we reviewed specific models of the control of movement endlocation (the mass-spring model) and of movement distance (the coding strategy explanations). Finally, we discussed the contribution of both kinesthetic signals and abstract code to the storage of location and distance information for controlling limb movements

    Possible Factors Mediating Lateralization Effect in Limb Positioning Movements and Hemispheric Specialization

    Get PDF
    Several influential factors mediating possible cerebral hemispheric specialization in limb positioning movements were reviewed. One important factor may be cognitive strategies employed by subjects in encoding available parameters during a given task. The difference between proximal and distal muscle groups for a task is also shown to be a crucial factor. Lateralization effects seem to appear in the distal parts while possible interhemispheric interference/conflict could occur in the proximal parts. The hemispace should also be considered as an important factor causing lateralization effects. These factors are suggested to be critically important to study motor control in limb positioning movements with respect to hemispheric specialization
    corecore