首页> 外文期刊>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems >Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits
【24h】

Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits

机译:重用硬件性能计数器来检测和识别内核控制流修改Rootkit

获取原文
获取原文并翻译 | 示例

摘要

Kernel rootkits are formidable threats to computer systems. They are stealthy and can have unrestricted access to system resources. This paper presents NumChecker, a new virtual machine (VM) monitor based framework to detect and identify control-flow modifying kernel rootkits in a guest VM. NumChecker detects and identifies malicious modifications to a system call in the guest VM by measuring the number of certain hardware events that occur during the system call’s execution. To automatically count these events, NumChecker leverages the hardware performance counters (HPCs), which exist in modern processors. By using HPCs, the checking cost is significantly reduced and the tamper-resistance is enhanced. We implement a prototype of NumChecker on Linux with the kernel-based VM. An HPC-based two-phase kernel rootkit detection and identification technique is presented and evaluated on a number of real-world kernel rootkits. The results demonstrate its practicality and effectiveness.
机译:内核Rootkit是对计算机系统的强大威胁。它们是隐形的,可以不受限制地访问系统资源。本文介绍了NumChecker,这是一个基于虚拟机(VM)的新框架,用于检测和识别来宾VM中修改内核rootkit的控制流。 NumChecker通过测量在执行系统调用期间发生的某些硬件事件的数量,来检测并识别来宾VM中对系统调用的恶意修改。为了自动计算这些事件,NumChecker利用了现代处理器中存在的硬件性能计数器(HPC)。通过使用HPC,显着降低了检查成本,并提高了防篡改能力。我们使用基于内核的VM在Linux上实现NumChecker的原型。提出了一种基于HPC的两阶段内核rootkit检测和识别技术,并在许多实际的内核rootkit上进行了评估。结果证明了其实用性和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号