A Stack-based Lightweight Approach to Detect Kernel-level Rookits

被引:0
作者
Liao, Zhenyi [1 ]
Luo, Yuan [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
来源
PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC) | 2015年
关键词
Rootkit Detection; Security; Control Flow Integrity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Kernel-level rootkits take operating system into a serious security situation. They mainly aim at compromising the integrity of the operating system. Prior research has shown that security properties of the kernel heap can be used for rootkit detection. However, scanning across the entire heap is a time-consuming process. This paper presents a novel rootkit detection technique to verify kernel integrity. We focus on the kernel mode stack that contains useful information on program execution. Our work bases on two key techniques, where the first one is to protect the kernel code in real time, and the second is to externally verify the right properties of the kernel mode stack. Further more, we implement a prototype named StackSafe on top of Xen virtual machine monitor (VMM). The implementation detects most of the kernel rootkits while imposing a little overhead to the VMM.
引用
收藏
页码:602 / 607
页数:6
相关论文
共 15 条
[1]  
Abadi Martin, 2005, P 12 ACM C COMP COMM, P340
[2]   Lurking in the shadows: Identifying systemic threats to kernel data (Short paper) [J].
Baliga, Arati ;
Kamat, Pandurang ;
Iftode, Liviu .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :246-+
[3]  
BIENIA C., 2008, TR81108 PRINC U
[4]  
Chen S., 2005, P 14 C USENIX SEC S, V5
[5]  
Cui Weidong., 2012, USENIX SECURITY, P42
[6]  
Garfinkel T., 2003, NDSS, V3
[7]   Ensuring Operating System Kernel Integrity with OSck [J].
Hofmann, Owen S. ;
Dunn, Alan M. ;
Kim, Sangman ;
Roy, Indrajit ;
Witchel, Emmett .
ACM SIGPLAN NOTICES, 2011, 46 (03) :279-290
[8]   Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction [J].
Jiang, Xuxian ;
Wang, Xinyuan ;
Xu, Dongyan .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (02)
[9]  
Mao Y., 2014, INF NETW SEC ICINS 2, P185
[10]  
Payne Bryan, LIBVMI VIRTUAL MACHI