首页> 外文会议>IEEE/ACM International Symposium on Microarchitecture >SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
【24h】

SHARK: Architectural support for autonomic protection against stealth by rootkit exploits

机译:鲨鱼:通过rootkit漏洞利用对隐形隐身自主保护的建筑支持

获取原文

摘要

Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities from users and system administrators without any authorization. Once infected, these malware applications will operate completely in stealth, leaving no trace for administrators and anti-malware tools. Current anti-rootkit solutions try to either strengthen the kernel by removing known vulnerabilities or develop software tools at the OS or Virtual Machine Monitor levels to monitor the integrity of the kernel. Seeing the failure of these software techniques, we propose, in this paper, an autonomic architecture called SHARK, or Secure Hardware support Against RootKit by employing hardware support to provide system-level security without trusting the software stack, including the OS kernel. SHARK enhances the relationship between the OS and the hardware architecture, making the entire system more security-aware in defending rootkits. SHARK proposes new architectural support to provide a secure association between each software context and the underlying hardware. It helps system administrators to obtain feedback directly from the hardware to reveal all running processes, even when the OS kernel is compromised. We emulated the functionality of SHARK by using x86 Bochs and modifying the Linux kernel version 2.6.16.33 based on our proposed architectural extension. Several real rootkits were installed to compromise the kernel and conceal malware processes on our emulated environment. SHARK is shown to be highly effective in identifying a variety of rootkits employing different software schemes. In addition, the performance analysis based on our Simics simulations shows a negligible overhead, making the SHARK architecture highly practical.
机译:rootkits在网络安全方面变得越来越担心。通常,它们利用内核漏洞来获得系统的root权限,并在没有任何授权的情况下隐藏恶意软件的活动和系统管理员的活动。一旦感染,这些恶意软件应用程序将在隐身中完全运行,留下管理员和反恶意软件工具的跟踪。目前的反rootkit解决方案通过删除已知的漏洞或在操作系统或虚拟机监视器级别开发软件工具来调整内核来试图加强内核,以监视内核的完整性。看到这些软件技术的失败,我们提出了一种名为Shark的自主体系结构,或通过使用硬件支持来提供系统级安全性而不信任软件堆栈,包括OS内核的系统级安全性的自动架构。 Shark增强了操作系统和硬件架构之间的关系,使整个系统在防御rootkits中更为安全感知。鲨鱼提出了新的架构支持,以便在每个软件上下文和底层硬件之间提供安全关联。它可以帮助系统管理员直接从硬件获取反馈,以显示所有正在运行的进程,即使OS内核受到损害。我们通过使用X86 Bochs模仿Shark的功能,并根据我们提出的架构扩展来修改Linux内核2.6.16.33版本。安装了几种真正的rootkits以危及内核并隐藏模拟环境中的恶意软件进程。鲨鱼被证明在识别采用不同软件方案的各种rootkits方面非常有效。此外,基于我们的SIMICS模拟的性能分析显示出可忽略不计的开销,使鲨鱼架构非常实用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号