首页> 外文会议>International conference on information systems security >Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming
【24h】

Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming

机译:使用缓冲区溢出和面向返回的编程来隐藏内核级Rootkit

获取原文

摘要

Kernel Level Rootkits are malwares that can be installed and hidden on a user's computer without revealing their existence. The goal of all rootkits is to carry out malicious execution while being hidden as long as possible on the user's system. We have developed and demonstrated, such a hiding technique for kernel level rootkits from static detection mechanisms. The hiding mechanism uses Return Oriented Programming, which allows the user to execute malicious code in the presence of certain inbuilt security defenses and detection tools. In this technique, an attacker diverts the control flow without injecting any new code in the program overflowing the buffer. We chain together short instruction sequences already present in a program's address space, each of which ends in a "return" instruction. This implemented hiding technique was tested using a custom detection tool which performs static analysis, for specified malicious behavior patterns along with other techniques. We have also examined it with other detection techniques. Experimental results indicate that our prototype was effective in hiding kernel level rootkits.
机译:内核级Rootkit是可以在用户计算机上安装和隐藏的恶意软件,而不会透露它们的存在。所有rootkit的目标是在用户系统上尽可能长地隐藏的同时执行恶意执行。我们已经开发并演示了从静态检测机制为内核级rootkits提供这种隐藏技术。隐藏机制使用面向返回的程序设计,该程序允许用户在某些内置的安全防护和检测工具存在的情况下执行恶意代码。在这种技术中,攻击者转移了控制流,而没有在溢出缓冲区的程序中注入任何新代码。我们将已经存在于程序地址空间中的短指令序列链接在一​​起,每个短指令序列都以“返回”指令结尾。使用自定义检测工具对该实现的隐藏技术进行了测试,该工具对指定的恶意行为模式以及其他技术执行了静态分析。我们还使用其他检测技术对其进行了检查。实验结果表明,我们的原型可以有效地隐藏内核级rootkit。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号