Towards a Tamper-Resistant Kernel Rootkit Detector

被引:0
|
作者
Quynh, Nguyen Anh [1 ]
Takefuji, Yoshiyasu [1 ]
机构
[1] Keio Univ, Grad Sch Media & Governance, Fujisawa, Kanagawa 2528520, Japan
关键词
Kernel Rootkit; Intrusion Detection; Xen Virtual Machine; Linux;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A variety of tools and architectures have been developed to detect security violations to Operating System kernels. However, they all have fundamental flaw in the design so that they fail to discover kernel-level attack. Few hardware solutions have been proposed to address the outstanding problem, but unfortunately they are not widely accepted. This paper presents a software-based method to detect intrusion to kernel. The proposed tool named XenKIMONO, which is based on Xen Virtual Machine, is able to detect many kernel rootkits in virtual machines with small penalty to the system's performance. In contrast with the traditional approaches, XenKIMONO is isolated with the kernel being monitored, thus it can still function correctly even if the observed kernel is compromised. Moreover, XenKIMONO is flexible and easy to deploy as it absolutely does not require any modification to the monitored systems.
引用
收藏
页码:276 / 283
页数:8
相关论文
共 50 条
  • [1] TAMPER-RESISTANT BUT NOT IMPOSSIBLE
    MCLEARN, D
    [J]. AMERICAN JOURNAL OF NURSING, 1985, 85 (03) : 244 - +
  • [2] Tamper-resistant biometric IDs
    Kirovski, D
    Jojic, N
    Jancke, G
    [J]. ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 160 - 175
  • [3] Tamper-resistant cryptographic hardware
    Fujino, Takeshi
    Kubota, Takaya
    Shiozaki, Mitsuru
    [J]. IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [4] TAMPER-RESISTANT PACKAGING - IS IT REALLY
    LOCKHART, HE
    RICHMOND, M
    SNEDEN, J
    [J]. PACKAGE ENGINEERING, 1983, 28 (07): : 96 - &
  • [5] Tamper-Resistant LikeJacking Protection
    Johns, Martin
    Lekies, Sebastian
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 265 - 285
  • [6] Tamper-resistant whole program partitioning
    Zhang, T
    Pande, S
    Valverde, A
    [J]. ACM SIGPLAN NOTICES, 2003, 38 (07) : 209 - 219
  • [7] Tamper-resistant ubiquitous data management
    Bouganim, L
    Ngoc, FD
    Pucheral, P
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (02): : 147 - 158
  • [8] The Research of Website Tamper-resistant Technology
    Qi Tao
    Wang Bo
    Zhao Sujuan
    [J]. ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 475 - +
  • [9] License protection with a tamper-resistant token
    Chong, CN
    Ren, B
    Doumen, J
    Etalle, S
    Hartel, PH
    Corin, R
    [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 223 - 237
  • [10] A Tamper-Resistant Programming Language System
    Heimbigner, Dennis
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) : 194 - 206