2008 Annual Computer Security Applications Conference (ACSAC) 2008
DOI: 10.1109/acsac.2008.29
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Inference and Enforcement of Kernel Data Structure Invariants

Abstract: Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structures, such as the system call table and values of function pointers, recent work has demonstrated rootkits that maliciously modify non-control data. Prior techniques for rootkit detection fail to identify such rootkits either because they focus solely on detecting control data modifications or because they require elaborate, manually-supp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
104
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 98 publications
(104 citation statements)
references
References 17 publications
0
104
0
Order By: Relevance
“…Furthermore, there is a plethora of research aimed towards protecting the Linux kernel [2,22,16,38,21,36,31]. Baliga [2] et al use a PCI device to acquire the memory and automatically derive the kernel invariance.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Furthermore, there is a plethora of research aimed towards protecting the Linux kernel [2,22,16,38,21,36,31]. Baliga [2] et al use a PCI device to acquire the memory and automatically derive the kernel invariance.…”
Section: Related Workmentioning
confidence: 99%
“…Baliga [2] et al use a PCI device to acquire the memory and automatically derive the kernel invariance. Currently, we discover the kernel invariance manually but we could employ their techniques directly and without modifications.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…3) Dynamic Learning: Rather than identifying code invariants from kernel source code, VMI based on dynamic analysis learns data structure invariants based on observing an OS instance [24,41,64].…”
Section: A Learning and Reconstructionmentioning
confidence: 99%