首页> 外文会议>IEEE Symposium on Security and Privacy >Lurking in the Shadows: Identifying Systemic Threats to Kernel Data (Short Paper)
【24h】

Lurking in the Shadows: Identifying Systemic Threats to Kernel Data (Short Paper)

机译:潜伏在阴影中:识别对内核数据的系统威胁(短文)

获取原文

摘要

The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malicious modifications in the kernel are harder to identify compared to their user-level counterparts. So far however, the pattern followed for tampering is limited to hiding malicious objects in user-space. This involves manipulating a subset of kernel data structures that are related to intercepting user requests or affecting the user's view of the system. Hence, defense techniques are built around detecting such hiding behavior. The contribution of this paper is to demonstrate a new class of stealthy attacks that only exist in kernel space and do not employ any hiding techniques traditionally used by rootkits. These attacks are stealthy because the damage done to the system is not apparent to the user or intrusion detection systems installed on the system and are symbolic of a more systemic problem present throughout the kernel. Our goal in building these attack prototypes was to show that such attacks are not only realistic, but worse; they cannot be detected by the current generation of kernel integrity monitors, without prior knowledge of the attack signature.
机译:内核代码和数据的完整性是计算机系统的完整性的基础。篡改内核数据是rootkit作家的一个有吸引力的场地,因为内核中的恶意修改更难识别与用户级同行相比识别。然而,到目前为止,篡改的模式仅限于隐藏用户空间中的恶意对象。这涉及操纵与拦截用户请求或影响系统的用户的视图相关的内核数据结构的子集。因此,在检测这种隐藏行为之外建立防御技术。本文的贡献是展示一类只存在于内核空间中的新阶级攻击攻击,并且不使用传统上使用rootkits的隐藏技术。这些攻击是隐身的,因为系统的损坏对于系统上安装的用户或入侵检测系统并不明显,并且是在整个内核中存在的更系统性问题的象征。我们在建立这些攻击原型的目标是表明这种攻击不仅是现实的,而且更糟糕的是;他们无法通过当前一代内核完整性监视器来检测,而无需先前了解攻击签名。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号