Go to main content

Securing Systems and Attached Devices in Oracle® Solaris 11.3

Exit Print View

Updated: April 2019
 
 

Protecting Against Malware With Security Extensions

Oracle Solaris protects address space, process heap, and the process stack, through the Security Extensions Framework. You use the framework's sxadm command to enable and disable security extensions and to manage their properties.

You can use the elfdump -d binary-path command to determine whether a particular binary is protected by security extensions.

    The security extensions configurations for a binary include:

  • Disabled – The security extension is disabled for all binaries.

  • Tagged binaries – The security extension is controlled by the tag that is coded in the binaries.

  • Enabled – The security extension is enabled for all binaries, except for those that are explicitly tagged to disable it.

sxadm includes a debugging interface, sxadm exec, which executes a specific program with a given security extension enabled or disabled for that single execution.