首页> 外文期刊>Dependable and Secure Computing, IEEE Transactions on >Detecting Kernel-Level Rootkits Using Data Structure Invariants
【24h】

Detecting Kernel-Level Rootkits Using Data Structure Invariants

机译:使用数据结构不变式检测内核级Rootkit

获取原文
获取原文并翻译 | 示例

摘要

Rootkits affect system security by modifying kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structures, such as the system call table and values of function pointers, recent work has demonstrated rootkits that maliciously modify noncontrol data. Most prior techniques for rootkit detection have focused solely on detecting control data modifications and, therefore, fail to detect such rootkits. This paper presents a novel technique to detect rootkits that modify both control and noncontrol data. The main idea is to externally observe the execution of the kernel during an inference phase and hypothesize invariants on kernel data structures. A rootkit detection phase uses these invariants as specifications of data structure integrity. During this phase, violation of invariants indicates an infection. We have implemented Gibraltar, a prototype tool that infers kernel data structure invariants and uses them to detect rootkits. Experiments show that Gibraltar can effectively detect previously known rootkits, including those that modify noncontrol data structures.
机译:Rootkit通过修改内核数据结构以实现各种恶意目标来影响系统安全性。早期的rootkit修改了控制数据结构,例如系统调用表和函数指针的值,而最近的工作证明了rootkit恶意修改了非控制数据。用于Rootkit检测的大多数现有技术仅专注于检测控制数据修改,因此无法检测到此类Rootkit。本文提出了一种新颖的技术来检测修改控制和非控制数据的rootkit。主要思想是在推理阶段从外部观察内核的执行情况,并假设内核数据结构上的不变量。 Rootkit检测阶段将这些不变量用作数据结构完整性的规范。在此阶段,不变量表示感染。我们已经实现了直布罗陀,这是一个原型工具,可以推断内核数据结构不变式,并使用它们来检测rootkit。实验表明,直布罗陀可以有效地检测以前已知的rootkit,包括修改非控制数据结构的rootkit。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号