2009
DOI: 10.1007/s11416-009-0139-z
|View full text |Cite
|
Sign up to set email alerts
|

Stealth malware analysis from kernel space with Kolumbo

Abstract: Most of today's malware are able to detect traditional debuggers and change their behavior whenever somebody tries to analyze them. The analysis of such malware becomes then a much more complex task. In this paper, we present the functionalities provided by the Kolumbo kernel module that can help simplify the analysis of malware. Four functionalities are provided for the analyst: system calls monitoring, virtual memory contents dumping, pseudobreakpoints insertion and eluding anti-debugging protections based o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 1 publication
(1 reference statement)
0
1
0
Order By: Relevance
“…Thus, while very useful for other contexts, these tools are not sufficient for real-time monitoring and analysis of all processes running on a Windows system. Therefore, we designed and implemented our own system call monitoring driver to monitor system calls and address some issues from the mentioned tools: our driver operates at the kernel level, making it hard for user-level malware to tamper with it or evade interception-most malware today can detect user level tracing and change behavior [37]; our driver is able to perform whole-system system call interception, since that DEEPMALWARE does not analyze processes in isolation-the context of processes' interactions with other processes in the system is considered.…”
Section: A the System Call Monitoring Drivermentioning
confidence: 99%
“…Thus, while very useful for other contexts, these tools are not sufficient for real-time monitoring and analysis of all processes running on a Windows system. Therefore, we designed and implemented our own system call monitoring driver to monitor system calls and address some issues from the mentioned tools: our driver operates at the kernel level, making it hard for user-level malware to tamper with it or evade interception-most malware today can detect user level tracing and change behavior [37]; our driver is able to perform whole-system system call interception, since that DEEPMALWARE does not analyze processes in isolation-the context of processes' interactions with other processes in the system is considered.…”
Section: A the System Call Monitoring Drivermentioning
confidence: 99%