Proceedings of the 4th ACM European Conference on Computer Systems 2009
DOI: 10.1145/1519065.1519072
|View full text |Cite
|
Sign up to set email alerts
|

Multi-aspect profiling of kernel rootkit behavior

Abstract: Kernel rootkits, malicious software designed to compromise a running operating system kernel, are difficult to analyze and profile due to their elusive nature, the variety and complexity of their behavior, and the privilege level at which they run. However, a comprehensive kernel rootkit profile that reveals key aspects of the rootkit's behavior is helpful in aiding a detailed manual analysis by a human expert. In this paper we present PoKeR, a kernel rootkit profiler capable of producing multi-aspect rootkit … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0
1

Year Published

2010
2010
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 64 publications
(54 citation statements)
references
References 20 publications
(19 reference statements)
0
53
0
1
Order By: Relevance
“…We propose that all future malware architectures should be based on the architecture presented in figure 2 below. This architecture is very similar to current ongoing research in [11] [13] [10] [38] that propose the use of hypervisors and virtualization techniques to deal with rootkits. Such an architecture would significantly reduce the chance that malware would be able to disable or compromise the antimalware program because the anti-malware program would be, at all times, executing at a higher privilege level than the malware.…”
Section: Addressing the Vulnerabilitiesmentioning
confidence: 71%
See 1 more Smart Citation
“…We propose that all future malware architectures should be based on the architecture presented in figure 2 below. This architecture is very similar to current ongoing research in [11] [13] [10] [38] that propose the use of hypervisors and virtualization techniques to deal with rootkits. Such an architecture would significantly reduce the chance that malware would be able to disable or compromise the antimalware program because the anti-malware program would be, at all times, executing at a higher privilege level than the malware.…”
Section: Addressing the Vulnerabilitiesmentioning
confidence: 71%
“…Rootkits are designed to fundamentally subvert the OS kernel and are capable of obtaining and maintaining unrestricted control and access within the compromised system without even being detected by antimalware software [14]. Rootkits can also hide other malicious software or activities such as open network connections, running processes and files on disk [10][11] [12]. Long life time rootkits are most likely to attempt to hide [11].…”
Section: Introductionmentioning
confidence: 99%
“…invoked system calls and its arguments. Other methods, such as those proposed in [21,22] not only observe objects interactions, but also, profile the interaction patterns such as evolving pattern of a malicious object's data structure in dynamic kernel memory. Profiled patterns are further used to derive a malware detection signature.…”
Section: Interrelation Between Observed Objectsmentioning
confidence: 99%
“…In our implementation, we further perform execution profiling of the identified malicious code. For example, in our experiments with kernel rootkits (Section 4.2), we leverage it and apply the combat tracking technique described in PoKeR [34] to profile rootkit execution within a given time window ([ST, EN]). In particular, for a subset of instructions identified thus, all memory reads and writes and their contents, are recorded in a log on the host OS.…”
Section: Analysis Modulesmentioning
confidence: 99%