
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,427 |
Article View | 9,188,656 |
PDF Download | 5,620,946 |
An Approach to Rootkit Detection Based on Virtual Machine Introspection | |||||||||||||||||||||||
پدافند غیرعامل | |||||||||||||||||||||||
Article 3, Volume 10, Issue 2 - Serial Number 38, September 2019, Pages 33-42 PDF (811.66 K) | |||||||||||||||||||||||
Document Type: Original Article | |||||||||||||||||||||||
Authors | |||||||||||||||||||||||
S. Parsa* ; F. Jamshidinia | |||||||||||||||||||||||
iran university of science and technology | |||||||||||||||||||||||
Receive Date: 12 February 2017, Revise Date: 13 February 2018, Accept Date: 17 October 2018 | |||||||||||||||||||||||
Abstract | |||||||||||||||||||||||
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control data or hooks in the kernel space function pointers, especially those dynamically allocated from heaps and memory pools. These areas of kernel memory are currently not monitored by kernel integrity checkers. On the other hand, traditional host-based detection tools are executed inside the host they are protecting, therefore, since these tools are executed within the kernel, they could be easily detected by the rootkits. To solve this problem, current rootkit detection tools deploy virtual machine introspection technique that monitors the state of running virtual machine at hypervisor level, without rootkits interposition. The goal of this thesis is to present an approach based on virtual machine introspection, to detect rootkits which hide themselves and their associated malwares in the main memory using system control flow modification. The proposed approach monitors the integrity of windows kernel function pointers that are potentially prone to malicious exploits, based entirely on virtual machine introspection. This approach is evaluated with a set of rootkits which use advanced hooking techniques and it is shown that it detects all of the stealth techniques utilized | |||||||||||||||||||||||
Keywords | |||||||||||||||||||||||
Rootkit; Virtual Machine Introspection; Hooking; Function Pointer | |||||||||||||||||||||||
References | |||||||||||||||||||||||
| |||||||||||||||||||||||
Statistics Article View: 2,836 PDF Download: 1,590 |