作者
Ryan Riley, Xuxian Jiang, Dongyan Xu
发表日期
2009/4/1
研讨会论文
Proceedings of the 4th ACM European conference on Computer systems
页码范围
47-60
出版商
ACM
简介
Kernel rootkits, malicious software designed to compromise a running operating system kernel, are difficult to analyze and profile due to their elusive nature, the variety and complexity of their behavior, and the privilege level at which they run. However, a comprehensive kernel rootkit profile that reveals key aspects of the rootkit's behavior is helpful in aiding a detailed manual analysis by a human expert. In this paper we present PoKeR, a kernel rootkit profiler capable of producing multi-aspect rootkit profiles which include the revelation of rootkit hooking behavior, the exposure of targeted kernel objects (both static and dynamic), assessment of user-level impacts, as well as the extraction of kernel rootkit code. The system is designed to be deployed in scenarios which can tolerate high overheads, such as honeypots. Our evaluation results with a number of real-world kernel rootkits show that PoKeR is able to …
引用总数
2009201020112012201320142015201620172018201920202021202220232024612141221111614116524451
学术搜索中的文章
R Riley, X Jiang, D Xu - Proceedings of the 4th ACM European conference on …, 2009