Second IEEE International Information Assurance Workshop, 2004. Proceedings.
DOI: 10.1109/iwia.2004.1288042
|View full text |Cite
|
Sign up to set email alerts
|

A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
2

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 2 publications
0
12
0
2
Order By: Relevance
“…Via VFS, Linux could avoid the great difference between the various functions and operations of file systems and access them in the same way. VFS ultimately call for the function of actual file system to complete the user requests [7]. Hooking VFS function can be more subtle than directly modify the system call pointer.…”
Section: A Control Flow Hijackingmentioning
confidence: 99%
“…Via VFS, Linux could avoid the great difference between the various functions and operations of file systems and access them in the same way. VFS ultimately call for the function of actual file system to complete the user requests [7]. Hooking VFS function can be more subtle than directly modify the system call pointer.…”
Section: A Control Flow Hijackingmentioning
confidence: 99%
“…Instead of gathering context information for argument similarity checks, all the return addresses associated with indirect calls seen during the learning phase are collected and compiled into trust lists that are used as whitelists for validating control flows. While location-based verification is not a particularly groundbreaking approach (e.g., the technique has been used in [50][51][52]), it helps determine whether or not a current control flow is trustworthy.…”
Section: Simplified Checks For Indirect Function Callsmentioning
confidence: 99%
“…While location-based verification is nothing new (defensive tools such as s0ftpj.org KSTAT and KSEC offered it at least since 2000 [36]; academic treatment can be found in, e.g., Levine, Grizzard, and Owen [14]), it allows us to make a simple decision about whether the current control flow is trustworthy or not. For this technique, we collect the return addresses that we encounter at each probe during the learning phase, then use the collected data to build trusted location lists that we can verify against in the detection phase.…”
Section: Trusted Location Listsmentioning
confidence: 99%