LKIM: The Linux Kernel Integrity Measurer

被引:0
|
作者
Pendergrass, J. Aaron
McGill, Kathleen N.
机构
来源
JOHNS HOPKINS APL TECHNICAL DIGEST | 2013年 / 32卷 / 02期
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Linux Kernel Integrity Measurer (LKIM) is a next-generation technology for the detection of malicious modifications to a running piece of software. Unlike traditional antivirus systems, LKIM does not rely on a database of known malware signatures; instead, LKIM uses a precise model of expected program behavior to verify the consistency of critical data structures at runtime. APL and the Research Directorate of the National Security Agency (NSA) developed the LKIM prototype and are now working to transition the technology to a variety of critical government applications.
引用
收藏
页码:509 / 516
页数:8
相关论文
共 50 条
  • [41] Snow on silk: A NodeOS in the linux kernel
    Shalaby, N
    Gottlieb, Y
    Wawrzoniak, M
    Peterson, L
    ACTIVE NETWORKS, PROCEEDINGS, 2002, 2546 : 1 - 19
  • [42] Efficient Formal Verification for the Linux Kernel
    de Oliveira, Daniel Bristot
    Cucinotta, Tommaso
    de Oliveira, Romulo Silva
    SOFTWARE ENGINEERING AND FORMAL METHODS (SEFM 2019), 2019, 11724 : 315 - 332
  • [43] Network Interface Grouping in the Linux Kernel
    Dogaru, Vlad
    Purdila, Octavian
    Tapus, Nicolae
    PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 131 - 135
  • [44] Operating System Noise in the Linux Kernel
    de Oliveira, Daniel Bristot
    Casini, Daniel
    Cucinotta, Tommaso
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (01) : 196 - 207
  • [45] Message filters for hardening the Linux kernel
    Nadella, Suneetha
    Janakiram, Dharanipragada
    SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (01): : 51 - 62
  • [46] IMPLEMENTING LOADABLE KERNEL MODULES FOR LINUX
    WELSH, M
    DR DOBBS JOURNAL, 1995, 20 (05): : 18 - &
  • [47] Comprehensive Integrity Protection for Desktop Linux
    Sze, Wai Kit
    Sekar, R.
    PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 89 - 92
  • [48] Trusted path execution for the Linux 2.6 kernel as a Linux Security Module
    Rahimi, NA
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK 2004 USENIX ANNUAL TECHNICAL CONFERENCE, 2004, : 73 - 80
  • [49] SYZDIRECT: Directed Greybox Fuzzing for Linux Kernel
    Tan, Xin
    Zhang, Yuan
    Lu, Jiadong
    Xiong, Xin
    Liu, Zhuang
    Yang, Min
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1630 - 1644
  • [50] Application of Philosophical Principles in Linux Kernel Customization
    Li, Hang
    Lin, Yan
    Zhao, XiLiang
    2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), 2019, : 365 - 365