Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory

被引:0
作者
Rhee, Junghwan [1 ]
Riley, Ryan [2 ]
Xu, Dongyan [1 ]
Jiang, Xuxian [3 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Qatar Univ, Doha, Qatar
[3] North Carolina State Univ, Raleigh, NC USA
来源
RECENT ADVANCES IN INTRUSION DETECTION | 2010年 / 6307卷
基金
美国国家科学基金会;
关键词
Kernel memory mapping; kernel malware analysis; virtualization;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approaches use kernel memory mapping to identify dynamic kernel objects and check kernel integrity. The snapshot-based memory maps generated by these approaches are based on the kernel memory which may have been manipulated by kernel malware. In addition, because the snapshot only reflects the memory status at a single time instance, its usage is limited in temporal kernel execution analysis. We introduce a new runtime kernel memory mapping scheme called allocation-driven mapping, which systematically identifies dynamic kernel objects, including their types and lifetimes. The scheme works by capturing kernel object allocation and deallocation events. Our system provides a number of unique benefits to kernel malware analysis: (1) an un-tampered view wherein the mapping of kernel data is unaffected by the manipulation of kernel memory and (2) a temporal view of kernel objects to be used in temporal analysis of kernel execution. We demonstrate the effectiveness of allocation-driven mapping in two usage scenarios. First, we build a hidden kernel object detector that uses an un-tampered view to detect the data hiding attacks of 10 kernel rootkits that directly manipulate kernel objects (DKOM). Second, we develop a temporal malware behavior monitor that tracks and visualizes malware behavior triggered by the manipulation of dynamic kernel objects. Allocation-driven mapping enables a reliable analysis of such behavior by guiding the inspection only to the events relevant to the attack.
引用
收藏
页码:178 / +
页数:3
相关论文
共 30 条
[1]  
[Anonymous], 2009, P 16 ACM C COMP COMM
[2]   Automatic Inference and Enforcement of Kernel Data Structure Invariants [J].
Baliga, Arati ;
Ganapathy, Vinod ;
Iftode, Liviu .
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, :77-86
[3]  
Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
[4]  
Boehm Hans-Juergen., 1988, Garbage Collection in an Uncooperative Environment. Software
[5]  
Butler J., DKOM (Direct Kernel Object Manipulation)
[6]  
Chow Jim., 2008, P 2008 USENIX ANN TE
[7]  
COZZIE A, 2008, P 8 USENIX S OP SYST
[8]  
*FREE SOFTW FDN, GNU COMP COLL
[9]  
Garfinkel T., NETWORK DISTRIBUTED
[10]  
Hicks Michael, 2007, P 14 ACM C COMP COMM