Cryptographic Enhancement of Named Pipes for Secure Process Communication
Main Article Content
Abstract
This study aims to enhance cryptographic security within the "named pipe" Inter-Process Communication (IPC) method utilized in Unix and Unix-like systems. Addressing security vulnerabilities inherent in the named pipe structure, this research endeavors to augment IPC security by integrating a cryptographic layer using the Advanced Encryption Standard (AES) encryption algorithm with 128-bit length key. The named pipe structure allows all processes specified by the owner or group to access data within the pipe. This implies the potential for processes generated by malicious software to access this data. By integrating a cryptographic secure communication structure into this bidirectional, readily applicable method, this study seeks to fortify the protocol. Technical objectives of this research involve encrypting messages with the AES-128 algorithm, enabling meaningful decryption of messages written with the same algorithm, and preventing interpretation of messages within the pipe by third-party processes lacking this cryptographic structure. Experimental findings showcase that when monitored by a process lacking this cryptographic structure, encrypted and incomprehensible messages are displayed, indicating the resistance of the encrypted structure against external interventions. In conclusion, this study introduces a new method to enhance security in IPC by adding a cryptographic security layer to the named pipe. This research may have implications for IPC security in Unix systems and could be applicable to other IPC methods facing similar security vulnerabilities.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
baeldung, W. by: (2020, October 20). Anonymous and named pipes in linux. Baeldung on Linux. https://www.baeldung.com/linux/anonymous-named-pipes
R. Lemos, T. Heinrich, C. A. Maziero and N. C. Will, "Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication", 2022 IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 2022, pp. 1-8, doi: 10.1109/SysCon53536.2022.9773881. DOI: https://doi.org/10.1109/SysCon53536.2022.9773881
M. Asif, M. M. Iqbal, M. U. Khalid, Y. Saleem, "SECURING THE MESSAGE PASSING IN INTER PROCESSCOMMUNICATION OF A MICROKERNEL", Sci.Int(Lahore),26(5),2103-2106,2014
Zeyu Mi, Dingji Li, Zihan Yang, Xinran Wang, and Haibo Chen. 2019. SkyBridge: Fast and Secure Inter-Process Communication for Microkernels. In Proceedings of the Fourteenth EuroSys Conference 2019 (EuroSys '19). Association for Computing Machinery, New York, NY, USA, Article 9, 1–15. https://doi.org/10.1145/3302424.3303946 DOI: https://doi.org/10.1145/3302424.3303946
K. J. Lin, C. P. Weng and T. K. Hou, "Enhance hardware security using FIFO in pipelines," 2011 7th International Conference on Information Assurance and Security (IAS), Melacca, Malaysia, 2011, pp. 344-349, doi: 10.1109/ISIAS.2011.6122844. DOI: https://doi.org/10.1109/ISIAS.2011.6122844
A. E. M. Eljialy, Sultan Ahmad, "A Novel Technique to Secure Inter-Process Communication," IJCSNS International Journal of Computer Science and Network Security, VOL.22 No.9, September 2022
“Ubuntu PC operating system | Ubuntu,” Ubuntu. https://ubuntu.com/desktop
Educative, “Educative Answers - trusted answers to developer questions,” Educative. https://www.educative.io/answers/what-is-ubuntu-linux
H. Dinari, “Inter-Process Communication (IPC) in Distributed Environments: An Investigation and Performance Analysis of Some Middleware Technologies,” International Journal of Modern Education and Computer Science, vol. 12, no. 2, pp. 36–52, Apr. 2020, doi: 10.5815/ijmecs.2020.02.05. DOI: https://doi.org/10.5815/ijmecs.2020.02.05
“The Interprocess Communication (IPC) overview.” https://www.ibm.com/support/pages/interprocess-communication-ipc-overview
I. Clough and N. Bergmann, "Using Linux FIFOs to allow Flexible Hardware/Software Communications on Reconfigurable Systems-on-Chip," FSP Workshop 2018; Fifth International Workshop on FPGAs for Software Programmers, Dublin, Ireland, 2018, pp. 1-2.
“Introduction to named Pipes | Linux Journal.” https://www.linuxjournal.com/article/2156
H. Gaikwad, “What are Named Pipes in Linux? - Scaler Topics,” Scaler Topics, Aug. 17, 2023. https://www.scaler.com/topics/linux-named-pipe/
Daemen, J., & Rijmen, V. (2000). The block Cipher Rijndael. In Lecture Notes in Computer Science (pp. 277–284). https://doi.org/10.1007/10721064_26 DOI: https://doi.org/10.1007/10721064_26
Dworkin, M. J. (2023). Advanced Encryption Standard. https://doi.org/10.6028/nist.fips.197-upd1 DOI: https://doi.org/10.6028/NIST.FIPS.197-upd1
OpenSSL Foundation, Inc. (n.d.). /index.html. https://www.openssl.org/
OpenSSL Foundation, Inc. (n.d.-a). /docs/man3.1/man7/crypto.html. https://www.openssl.org/docs/man3.1/man7/crypto.html
Kekayan. (2018, July 7). Encrypt files using AES with OPENSSL - Kekayan - Medium. Medium. https://kekayan.medium.com/encrypt-files-using-aes-with-openssl-dabb86d5b748
H. Karacali, N. Dönüm, and E. Cebel, “Secure and efficient NVM usage for embedded systems using AES-128 and Huffman Compression,” The European Journal of Research and Development, vol. 3, no. 4, pp. 333–356, Dec. 2023, doi: 10.56038/ejrnd.v3i4.281. DOI: https://doi.org/10.56038/ejrnd.v3i4.281