Towards a Tamper-Resistant Kernel Rootkit Detector

被引:0
|
作者
Quynh, Nguyen Anh [1 ]
Takefuji, Yoshiyasu [1 ]
机构
[1] Keio Univ, Grad Sch Media & Governance, Fujisawa, Kanagawa 2528520, Japan
关键词
Kernel Rootkit; Intrusion Detection; Xen Virtual Machine; Linux;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A variety of tools and architectures have been developed to detect security violations to Operating System kernels. However, they all have fundamental flaw in the design so that they fail to discover kernel-level attack. Few hardware solutions have been proposed to address the outstanding problem, but unfortunately they are not widely accepted. This paper presents a software-based method to detect intrusion to kernel. The proposed tool named XenKIMONO, which is based on Xen Virtual Machine, is able to detect many kernel rootkits in virtual machines with small penalty to the system's performance. In contrast with the traditional approaches, XenKIMONO is isolated with the kernel being monitored, thus it can still function correctly even if the observed kernel is compromised. Moreover, XenKIMONO is flexible and easy to deploy as it absolutely does not require any modification to the monitored systems.
引用
收藏
页码:276 / 283
页数:8
相关论文
共 50 条
  • [21] FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor
    Ye, Zhenyu
    Zhou, Lei
    Zhang, Fengwei
    Jin, Wenqiang
    Ning, Zhenyu
    Hu, Yupeng
    Qin, Zheng
    PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 2024, : 38 - 50
  • [22] FDA sketches parameters for tamper-resistant opioids
    Kondro, Wayne
    CANADIAN MEDICAL ASSOCIATION JOURNAL, 2013, 185 (03) : E134 - E135
  • [23] Distributed Signing Protocol for Tamper-Resistant Module
    Kiyomoto, Shinsaku
    Ishiguro, Tsukasa
    Miyake, Yutaka
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 97 - 105
  • [24] The Implications of Tamper-Resistant Formulations for Opioid Rotation
    Pappagallo, Marco
    Sokolowska, Marta
    POSTGRADUATE MEDICINE, 2012, 124 (05) : 101 - 109
  • [25] Design principles for tamper-resistant smartcard processors
    Kömmerling, O
    Kuhn, MG
    PROCEEDINGS OF THE USENIX WORKSHOP ON SMARTCARD TECHNOLOGY (SMARTCARD '99), 1999, : 9 - 20
  • [26] Tamper-resistant receptacles: the rules have changed
    Currall, John
    EC and M: Electrical Construction and Maintenance, 1995, 94 (11):
  • [27] Tamper-resistant storage techniques for multimedia systems
    Haubert, E
    Tucek, J
    Brumbaugh, L
    Yurcik, W
    Storage and Retrieval Methods and Applications for Multimedia 2005, 2005, 5682 : 30 - 40
  • [28] A Tamper-Resistant Authentication Scheme on Digital Image
    Liu, Guangqi
    Zheng, Xiaoshi
    Zhao, Yanling
    Li, Na
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 867 - 872
  • [29] Delayed and controlled failures in tamper-resistant software
    Tan, Gang
    Chen, Yuqun
    Jakubowski, Mariusz H.
    INFORMATION HIDING, 2007, 4437 : 216 - +
  • [30] Secure audit logging with tamper-resistant hardware
    Chong, CN
    Peng, ZH
    Hartel, PH
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 73 - 84