A Software Detection Mechanism Based on SMM in Network Computing

被引:2
|
作者
Zhou, Lei [1 ]
Shu, Yang [1 ]
Wang, Guojun [2 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
关键词
Software detection; Memory forensics; SMM; Semantic gap; Security agent; ROOTKIT;
D O I
10.1007/978-3-319-49145-5_14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To guarantee the network computing system security, the effective method is illegal or malicious software detection. Most of the former researches implement it on OS kernel or hypervisor level. However, if the system is attacked by the ring 0 or ring 1 level risks, the OS kernel or hypervisor is unable to provide the trusted base, which may cause an incorrect result. To solve the shortcomings, we choose the System Management Mode (SMM) to build a trusted execution environment. The SMM is a special cpu mode in the x86 architecture, which could create a security and isolated area on firmware level for malicious attacks detection. In this paper, we remotely interrupt the local system, and design a secure module in SMM to obtain messages from registers and physical memory space. Those messages are used to back analyze the software executing code segment for further information comparing. Beside the local detection, we use remote attestation approach for verifying the secure module. Our approach resists the attack surface under the OS level, and advances state-of-the-art detecting transparently. Furthermore, the analysis process could implement in the server to reduce the overheads on the client platform.
引用
收藏
页码:134 / 143
页数:10
相关论文
共 50 条
  • [31] An Unknown Trojan Detection Method Based on Software Network Behavior
    LIANG Yu
    PENG Guojun
    ZHANG Huanguo
    WANG Ying
    Wuhan University Journal of Natural Sciences, 2013, 18 (05) : 369 - 376
  • [32] A Clone Code Detection Method Based on Software Complex Network
    Guo, Haoran
    Ai, Jun
    Shi, Tao
    2019 IEEE 30TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2019), 2019, : 120 - 121
  • [33] A Software Vulnerability Detection Method Based on Complex Network Community
    Shan, Chun
    Gong, Yinghui
    Xiong, Ling
    Liao, Shuyan
    Wang, Yuyang
    Security and Communication Networks, 2022, 2022
  • [34] A Software Vulnerability Detection Method Based on Complex Network Community
    Shan, Chun
    Gong, Yinghui
    Xiong, Ling
    Liao, Shuyan
    Wang, Yuyang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [35] Intrusion Detection System based on Software Defined Network Firewall
    Sayeed, Mohd Abuzar
    Sayeed, Mohd Asim
    Saxena, Sharad
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 379 - 382
  • [36] A software agent based approach for fraud detection in network crimes
    Patra, MR
    Jayasingh, BB
    APPLIED COMPUTING, PROCEEDINGS, 2004, 3285 : 310 - 316
  • [37] Automated Software Vulnerability Detection Based on Hybrid Neural Network
    Li, Xin
    Wang, Lu
    Xin, Yang
    Yang, Yixian
    Tang, Qifeng
    Chen, Yuling
    APPLIED SCIENCES-BASEL, 2021, 11 (07):
  • [38] Feedback based Sampling for Intrusion Detection in Software Defined Network
    Shi, Jiangyong
    Zeng, Yingzhi
    Wang, Wenhao
    Yang, Yuexiang
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 95 - 99
  • [39] A Proactive Reliable Mechanism-Based Vehicular Fog Computing Network
    Dong, Luobing
    Ni, Qiufen
    Wu, Weili
    Huang, Chuanhe
    Znati, Taieb
    Du, Ding Zhu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11895 - 11907
  • [40] An advanced computing approach for software vulnerability detection
    Do Xuan C.
    Cong B.V.
    Multimedia Tools and Applications, 2024, 83 (39) : 86707 - 86740