AIT: A method for operating system kernel function call graph generation with a virtualization technique

被引:0
|
作者
Jiao, Longlong [1 ]
Luo, Senlin [1 ]
Liu, Wangtong [1 ]
Pan, Limin [1 ]
机构
[1] Beijing Inst Technol, Informat Syst & Secur & Countermeasures Expt Ctr, Beijing 100081, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2020年 / 14卷 / 05期
关键词
Function call graph; operating system kernel; virtualization; system trap;
D O I
10.3837/tiis.2020.05.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Operating system (OS) kernel function call graphs have been widely used in OS analysis and defense. However, most existing methods and tools for generating function call graphs are designed for application programs, and cannot be used for generating OS kernel function call graphs. This paper proposes a virtualization-based call graph generation method called Acquire in Trap (AIT). When target kernel functions are called, AIT dynamically initiates a system trap with the help of a virtualization technique. It then analyzes and records the calling relationships for trap handling by traversing the kernel stacks and the code space. Our experimental results show that the proposed method is feasible for both Linux and Windows OSs, including 32 and 64-bit versions, with high recall and precision rates. AIT is independent of the source code, compiler and OS kernel architecture, and is a universal method for generating OS kernel function call graphs.
引用
收藏
页码:2084 / 2100
页数:17
相关论文
共 7 条
  • [1] VirtuOS: an operating system with kernel virtualization
    Nikolaev, Ruslan
    Back, Godmar
    SOSP'13: PROCEEDINGS OF THE TWENTY-FOURTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2013, : 116 - 132
  • [2] A Generation Model of Function Call Based on the Control Flow Graph
    Sun, Weizhen
    Du, Xiangyan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013, 2014, 250 : 513 - 520
  • [3] Embedding vector generation based on function call graph for effective malware detection and classification
    Xiao-Wang Wu
    Yan Wang
    Yong Fang
    Peng Jia
    Neural Computing and Applications, 2022, 34 : 8643 - 8656
  • [4] Embedding vector generation based on function call graph for effective malware detection and classification
    Wu, Xiao-Wang
    Wang, Yan
    Fang, Yong
    Jia, Peng
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (11) : 8643 - 8656
  • [5] SeGDroid: An Android malware detection method based on sensitive function call graph learning
    Liu, Zhen
    Wang, Ruoyu
    Japkowicz, Nathalie
    Gomes, Heitor Murilo
    Peng, Bitao
    Zhang, Wenbin
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 235
  • [6] 2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes
    Hao Liu
    Chun Guo
    Yunhe Cui
    Guowei Shen
    Yuan Ping
    Applied Intelligence, 2021, 51 : 9038 - 9053
  • [7] 2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes
    Liu, Hao
    Guo, Chun
    Cui, Yunhe
    Shen, Guowei
    Ping, Yuan
    APPLIED INTELLIGENCE, 2021, 51 (12) : 9038 - 9053