Abstract
This study aims to enhance cryptographic security within the "named pipe" Inter-Process Communication (IPC) method utilized in Unix and Unix-like systems. Addressing security vulnerabilities inherent in the named pipe structure, this research endeavors to augment IPC security by integrating a cryptographic layer using the Advanced Encryption Standard (AES) encryption algorithm with 128-bit length key. The named pipe structure allows all processes specified by the owner or group to access data within the pipe. This implies the potential for processes generated by malicious software to access this data. By integrating a cryptographic secure communication structure into this bidirectional, readily applicable method, this study seeks to fortify the protocol. Technical objectives of this research involve encrypting messages with the AES-128 algorithm, enabling meaningful decryption of messages written with the same algorithm, and preventing interpretation of messages within the pipe by third-party processes lacking this cryptographic structure. Experimental findings showcase that when monitored by a process lacking this cryptographic structure, encrypted and incomprehensible messages are displayed, indicating the resistance of the encrypted structure against external interventions. In conclusion, this study introduces a new method to enhance security in IPC by adding a cryptographic security layer to the named pipe. This research may have implications for IPC security in Unix systems and could be applicable to other IPC methods facing similar security vulnerabilities.
Publisher
Orclever Science and Research Group
Reference19 articles.
1. baeldung, W. by: (2020, October 20). Anonymous and named pipes in linux. Baeldung on Linux. https://www.baeldung.com/linux/anonymous-named-pipes
2. R. Lemos, T. Heinrich, C. A. Maziero and N. C. Will, "Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication", 2022 IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 2022, pp. 1-8, doi: 10.1109/SysCon53536.2022.9773881.
3. M. Asif, M. M. Iqbal, M. U. Khalid, Y. Saleem, "SECURING THE MESSAGE PASSING IN INTER PROCESSCOMMUNICATION OF A MICROKERNEL", Sci.Int(Lahore),26(5),2103-2106,2014
4. Zeyu Mi, Dingji Li, Zihan Yang, Xinran Wang, and Haibo Chen. 2019. SkyBridge: Fast and Secure Inter-Process Communication for Microkernels. In Proceedings of the Fourteenth EuroSys Conference 2019 (EuroSys '19). Association for Computing Machinery, New York, NY, USA, Article 9, 1–15. https://doi.org/10.1145/3302424.3303946
5. K. J. Lin, C. P. Weng and T. K. Hou, "Enhance hardware security using FIFO in pipelines," 2011 7th International Conference on Information Assurance and Security (IAS), Melacca, Malaysia, 2011, pp. 344-349, doi: 10.1109/ISIAS.2011.6122844.