首页> 外文会议>Design, Automation Test in Europe Conference Exhibition >Hardware-Assisted Rootkit Detection via On-line Statistical Fingerprinting of Process Execution
【24h】

Hardware-Assisted Rootkit Detection via On-line Statistical Fingerprinting of Process Execution

机译:硬件辅助rootkit通过在线统计指纹进行过程执行

获取原文

摘要

Kernel rootkits generally attempt to maliciously tamper kernel objects and surreptitiously distort program execution flow. Herein, we introduce a hardware-assisted hierarchical on-line system which detects such kernel rootkits by identifying deviation of dynamic intra-process execution profiles based on architecture-level semantics captured directly in hardware. The underlying key insight is that, in order to take effect, malicious manipulation of kernel objects must distort the execution flow of benign processes, thereby leaving abnormal traces in architecture-level semantics. While traditional detection methods rely on software modules to collect such traces, their implementations are susceptible to being compromised through software attacks. In contrast, our detection system maintains immunity to software attacks by resorting to hardware for trace collection. The proposed method is demonstrated on a Linux-based operating system running on a 32-bit x86 architecture, implemented in Simics. Experimental results, using real-world kernel rootkits, corroborate the effectiveness of this method, while a predictive 45nm PDK is used to evaluate hardware overhead.
机译:内核rootkits通常尝试恶意篡改内核对象并偷偷摸摸地扭曲程序执行流程。这里,我们引入了一种硬件辅助分层在线系统,通过识别基于直接在硬件中捕获的体系结构级语义来识别动态内部执行配置文件的偏差来检测此类内核rootkit。基础关键洞察力是,为了生效,核心对象的恶意操纵必须扭曲良好过程的执行流程,从而在架构级语义中留下异常迹线。虽然传统的检测方法依赖于软件模块来收集这些迹线,但它们的实现易于通过软件攻击受到影响。相比之下,我们的检测系统通过借助跟踪集合的硬件来维持对软件攻击的免疫力。在SIMICS中实现的32位X86架构上运行的基于Linux的操作系统,在基于Linux的操作系统上说明了该方法。实验结果,使用现实世界内核rootkits,证实了这种方法的有效性,而预测45nm PDK用于评估硬件开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号