Dynamic Detection of Process-Hiding Kernel Rootkits

نویسندگان

  • Liang Xu
  • Zhendong Su
چکیده

Stealth rootkits that hide themselves on victim systems pose a major threat to computer systems. They are usually evasive as they use sophisticated stealth techniques to conceal files, processes, kernel modules, and other types of objects, making it extremely challenging to detect their presence in the victim system. However, current detection techniques are mostly system-specific and ineffective for unknown rootkits. In this paper, we present the design, implementation and evaluation of XView, a dynamic cross-view based approach to detect rootkits by identifying hidden processes. To this end, we continuously maintain a list of active processes outside the monitored system, and compare it with the list reported by the guest system. XView overcomes the semantic gap by intercepting and interpreting system call events of the guest operating system in a non-intrusive manner. It dynamically monitors the guest system and reconstructs semantic-level process information. Since it is not directed against any specific hiding techniques, it is able to detect unknown rootkits. We have developed an XView prototype and conducted experiments using eleven rootkit samples. Our evaluation results show that XView is able to identify processhiding behaviors of all samples with modest performance

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Countering Persistent Kernel Rootkits through Systematic Hook Discovery

Kernel rootkits, as one of the most elusive types of malware, pose significant challenges for investigation and defense. Among the most notable are persistent kernel rootkits, a special type of kernel rootkits that implant persistent kernel hooks to tamper with the kernel execution to hide their presence. To defend against them, an effective approach is to first identify those kernel hooks and ...

متن کامل

Identifying Rootkit Infections Using a New Windows Hidden-driver-based Rootkit

It can be observed that most sophisticated kernel mode rootkits implement hiding tasks via loading drivers in Windows. Also, more and more malware writers are taking advantage of rootkits to shield their illegal activities. Therefore, the role of a detector for effectively detecting Windows driver-hidden rootkits is becoming extremely important. In our previous work, we focused on developing a ...

متن کامل

Rootkits and Malicious Code Injection

Rootkits, are considered by many to be one of the most stealthy computer malware(malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel. As this can be achieved by loadable kernel code sections, this paper tries to explain common entry points into a Linux kernel and how...

متن کامل

GRIM: Leveraging GPUs for Kernel Integrity Monitoring

Kernel rootkits can exploit an operating system and enable future accessibility and control, despite all recent advances in software protection. A promising defense mechanism against rootkits is Kernel Integrity Monitor (KIM) systems, which inspect the kernel text and data to discover any malicious changes. A KIM can be implemented either in software, using a hypervisor, or using extra hardware...

متن کامل

Predicting the Future of Stealth Attacks Kapoor & Mathur

This paper takes an in-depth look into the attack strategies of recent rootkits and analyses what has worked for them. In doing so it highlights some of the profi table attack methodologies from the perspective of kernel rootkits. The discussion in this paper about prediction of the future of stealth attacks is derived from our analysis of multiple rootkits over many years and also based on cur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009