International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 0

Research Paper | Information Security | India | Volume 11 Issue 2, February 2022


Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication

Ujas Dhami [4] | Nisarg Shah [4]


Abstract: The monolithic kernel is a widely used kernel when building ARM architectures and Linux distributions. With all instructions being in the kernel space, it is insecure, and can easily perform cross-transactions of sensitive information when under a memory leak, thus, it is vital to lock certain sections of the kernel to confine it from exposing personal information to risk. Investigation: This paper demonstrates a Volatile Operating System formulated by the authors with the use of Keyring Subsystems for fragmenting the kernel space into multiple domes using security keys. Method: A kernel is configured and built using security modules, and deployed with anonymization tools to a bootable USB, to check if memory leaks leave traces of cache into the device drivers or the disk. These anonymization tools help to clear memory. Principle Result: Less to no information was transmitted to the device memory, leaving everything as is. The anonymization tools cleared off all the events and cache before shutting down the system, making it challenging for forensics to acknowledge the use of a volatile OS into the device from a USB stick.


Keywords: Operating System, OS Development, Monolithic Kernel, Kernel Security and Anonymity, Anonymization


Edition: Volume 11 Issue 2, February 2022,


Pages: 148 - 151


How to Cite this Article?

Ujas Dhami, Nisarg Shah, "Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication", International Journal of Science and Research (IJSR), Volume 11 Issue 2, February 2022, pp. 148-151, https://www.ijsr.net/get_abstract.php?paper_id=SR22131160746

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'System'

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Security, India, Volume 10 Issue 12, December 2021

Pages: 77 - 79

Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview

Ankit Srivastava [3] | Jatin Nagpal

Share this Article

Downloads: 3

Research Paper, Information Security, India, Volume 11 Issue 1, January 2022

Pages: 807 - 812

Deriving Ransomware Formulation Complexity and Compromisation Topology

Ujas Dhami [4] | Nisarg Shah [4]

Share this Article


Top