首页> 外文会议>European symposium on research in computer security >KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks
【24h】

KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks

机译:KQGuard:反对内核队列注射攻击的二进制防御

获取原文

摘要

Kernel callback queues (KQs) are the mechanism of choice for handling events in modern kernels. KQs have been misused by real-world malware to run malicious logic. Current defense mechanisms for kernel code and data integrity have difficulties with kernel queue injection (KQI) attacks, since they work without necessarily changing legitimate kernel code or data. In this paper, we describe the design, implementation, and evaluation of KQguard, an efficient and effective protection mechanism of KQs. KQguard uses static and dynamic analysis of kernel and device drivers to learn the legitimate event handlers. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We implement KQguard on the Windows Research Kernel (WRK) and Linux and extensive experimental evaluation shows that KQguard is efficient (up to -5% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). KQguard protects 20 KQs in WRK, can accommodate new device drivers, and through dynamic analysis of binary code can support closed source device drivers.
机译:内核回调队列(KQS)是处理现代内核中的事件的选择机制。 KQS已被真实世界恶意软件滥用恶意逻辑。内核代码和数据完整性的当前防御机制具有内核队列注入(KQI)攻击的困难,因为它们工作而不需要改变合法内核代码或数据。在本文中,我们描述了KQGuard的设计,实施和评估,高效且有效的KQS保护机制。 KQGuard使用静态和动态分析内核和设备驱动程序来学习合法事件处理程序。在运行时,kquard拒绝无法验证的所有未知kq请求。我们在Windows研究内核(WRK)和Linux上实施KQGuard和大量的实验评估表明,KQGuard高效(高达-5%的开销),有效(能够在适当的培训后实现对代表良性工作负载的零误报,非常低对抗125个现实世界恶意软件和九个合成攻击的负面影响)。 KQGuard在WRK中保护20公斤,可以容纳新的设备驱动程序,并通过对二进制代码的动态分析可以支持闭合源设备驱动程序。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号