Identifying Rootkit Infections Using a New Windows Hidden-driver-based Rootkit

نویسندگان

  • Woei-Jiunn Tsaur
  • Lo-Yao Yeh
چکیده

It can be observed that most sophisticated kernel mode rootkits implement hiding tasks via loading drivers in Windows. Also, more and more malware writers are taking advantage of rootkits to shield their illegal activities. Therefore, the role of a detector for effectively detecting Windows driver-hidden rootkits is becoming extremely important. In our previous work, we focused on developing a new Windows driver-hidden rootkit with five tricks based on the technique of DKOM (Direct Kernel Object Manipulation), which has verified that it can successfully avoid a variety of well-known rootkit detectors. In this paper, we extend our previous work by employing what we learn from the proposed new driver-hidden rootkit to explore remedies and solution for identifying not only the new threat but also other existing rootkits. It is expected that this research will contribute to the development of rootkit detection methods for unknown Windows hiddendriver-based rootkits.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Windows Rootkit Technologies for Enhancing Digital Rights Management in Cloud Computing Environments

With the increasing development of cloud computing technologies, digital contents such as music, movies, games, cartoon, and so on get more and more popular for entertainment, and therefore how to control and manage rights of digital contents has been becoming very critical in cloud computing environments. Sony-BMG used a rootkit to conceal the digital rights management (DRM) software, which is...

متن کامل

New Protection of Kernel-level Digital Rights Management in Cloud-based Consumer Electronics Environments

Controlling and managing rights of digital contents has been becoming very critical in cloud-based consumer entertainment devices. The kernel-level digital rights management (DRM) software can offer stronger protection of digital contents. For effectively preventing unauthorized copying, the rootkit stealth technologies may be employed in consumer electronics (CE) environments to conceal kernel...

متن کامل

A Forced Sampled Execution Approach to Kernel Rootkit Identification

Kernel rootkits are considered one of the most dangerous forms of malware because they reside inside the kernel and can perform the most privileged operations on the compromised machine. Most existing kernel rootkit detection techniques attempt to detect the existence of kernel rootkits, but cannot do much about removing them, other than booting the victim machine from a clean operating system ...

متن کامل

Poster: CompareView - A Provenance Verification Framework for Detecting Rootkit-Based Malware

Using rootkit mechanisms to hide malware presence is pervasive in today’s computer attacks. We propose the CompareView framework, a host-based solution to detect stealthy outbound traffic generated by rootkit-based malware. Using a lightweight cryptographic protocol, our CompareView framework compares the views of outbound network packets at different layers of the host network stack and verify...

متن کامل

Concepts for the Stealth Windows Rootkit

Purpose Many people do not realize the real danger from rootkit technology. One reason for this is probably that publicly available rootkits for Windows OS are relatively easy to detect by conventional methods (i.e. memory scanning based). However, we can imagine some techniques of rootkit implementation, which will be undetectable by these methods, even if the rootkit concept will be publicly ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012