Detection of Hardware Virtualization Based Rootkits by Performance Benchmarking

نویسندگان

  • Iain Kyte
  • Pavol Zavarsky
  • Dale Lindskog
  • Ron Ruhl
چکیده

This paper describes an enhanced side-channel analysis method to detect hardware virtualization based rootkits, by detecting performance degradation caused by the hardware virtualization itself. The method proposed is, (like a network intrusion detection system), both passive and remote, so it is not easily detected by the rookit. The method does not rely on an internal and therefore untrustable timing source, and does not rely on the rootkit's potentially imperfect representation of the actual physical characteristics of the computing platform. For these reasons, it is believed that this method is not subject to criticisms normally levelled against the currently proposed methods of detecting hardware virtualization or hardware virtualization rootkits . Measuring performance degradation requires a baseline, and compared with that baseline, the degradation must be sufficiently great to be judged anomalous with reasonable confidence. That degradation must also be accurately measurable by a trusted and therefore external timing source. Accordingly the benchmarking experiment that has been devised was performed using commodity hardware and freely available software, to determine which resources virtualization seems to degrade performance most significantly, and of these resources, which are most accurately timed externally. Although the results are preliminary, and strictly speaking, apply only to the actual hardware used in the experiment, they nonetheless show that there is potential to use passive network analysis to detect hardware based virtualization rootkits and associated malware. It is possible that the experimental method itself is of considerable value in guiding readers to develop baselines for their own computer systems, and therefore assist them to detect the performance degradation expected after the installation of a hardware virtualization based rootkit.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transparent Protection of Commodity OS Kernels Using Hardware Virtualization

Kernel rootkits are among the most insidious threats to computer security today. By employing various code injection techniques, they are able to maintain an omnipotent presence in the compromised OS kernels. Existing preventive countermeasures typically employ virtualization technology as part of their solutions. However, they are still limited in either (1) requiring modifying the OS kernel s...

متن کامل

Dynamic Detection of Process-Hiding Kernel Rootkits

Stealth rootkits that hide themselves on victim systems pose a major threat to computer systems. They are usually evasive as they use sophisticated stealth techniques to conceal files, processes, kernel modules, and other types of objects, making it extremely challenging to detect their presence in the victim system. However, current detection techniques are mostly system-specific and ineffecti...

متن کامل

Compatibility Is Not Transparency: VMM Detection Myths and Realities

Recent work on applications ranging from realistic honeypots to stealthier rootkits has speculated about building transparent VMMs – VMMs that are indistinguishable from native hardware, even to a dedicated adversary. We survey anomalies between real and virtual hardware and consider methods for detecting such anomalies, as well as possible countermeasures. We conclude that building a transpare...

متن کامل

Virtualized Systems and Their Performance a Literature Review

There are numerous facets to virtualization and a number of authors have presented work in this field. Hardware Level Virtualization presents an interesting method for the full utilisation of modern computer systems and for increasing the performance of such systems. In this review, literature in the field of hardware virtualization, its performance and relevant aspects of benchmarking is prese...

متن کامل

Hello rootKitty: A Lightweight Invariance-Enforcing Framework

In monolithic operating systems, the kernel is the piece of code that executes with the highest privileges and has control over all the software running on a host. A successful attack against an operating system’s kernel means a total and complete compromise of the running system. These attacks usually end with the installation of a rootkit, a stealthy piece of software running with kernel priv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010