Kernel-level rootkit detection, prevention and behavior profiling: a taxonomy and survey

M Nadim, W Lee, D Akopian - arXiv preprint arXiv:2304.00473, 2023 - arxiv.org
One of the most elusive types of malware in recent times that pose significant challenges in
the computer security system is the kernel-level rootkits. The kernel-level rootkits can hide its …

Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms

M Botacin, PLD Geus, A Grégio - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …

[HTML][HTML] Mind control attack: Undermining deep learning with GPU memory exploitation

SO Park, O Kwon, Y Kim, SK Cha, H Yoon - Computers & Security, 2021 - Elsevier
Modern deep learning frameworks rely heavily on GPUs to accelerate the computation.
However, the security implication of GPU device memory exploitation on deep learning …

Nighthawk: Transparent system introspection from ring-3

L Zhou, J Xiao, K Leach, W Weimer, F Zhang… - … –ESORICS 2019: 24th …, 2019 - Springer
During the past decade, virtualization-based (eg, virtual machine introspection) and
hardware-assisted approaches (eg, x86 SMM and ARM TrustZone) have been used to …

ZeroKernel: Secure context-isolated execution on commodity GPUs

O Kwon, Y Kim, J Huh, H Yoon - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In the last decade, the dedicated graphics processing unit (GPU) has emerged as an
architecture for high-performance computing workloads. Recently, researchers have also …

Canon: Lightweight and practical cyber-attack detection for automotive controller area networks

Y Baek, S Shin - Sensors, 2022 - mdpi.com
Automotive cyber-physical systems are in transition from the closed-systems to open-
networking systems. As a result, in-vehicle networks such as the controller area network …

Hypernel: a hardware-assisted framework for kernel protection without nested paging

D Kwon, K Oh, J Park, S Yang, Y Cho… - Proceedings of the 55th …, 2018 - dl.acm.org
Large OS kernels always suffer from attacks due to their numerous inherent vulnerabilities.
To protect the kernel, hypervisors have been employed by many security solutions …

Mitigation of kernel memory corruption using multiple kernel memory mechanism

H Kuzuno, T Yamauchi - IEEE Access, 2021 - ieeexplore.ieee.org
Operating systems adopt kernel protection methods (eg, mandatory access control, kernel
address space layout randomization, control flow integrity, and kernel page table isolation) …

Riskim: Toward complete kernel protection with hardware support

D Hwang, M Yang, S Jeon, Y Lee… - … Design, Automation & …, 2019 - ieeexplore.ieee.org
The OS kernel is typically the assumed trusted computing base in a system. Consequently,
when they try to protect the kernel, developers often build their solutions in a separate …

A hardware platform for ensuring OS kernel integrity on RISC-V

D Kwon, D Hwang, Y Paek - Electronics, 2021 - mdpi.com
The OS kernel is typically preassumed as a trusted computing base in most computing
systems. However, it also implies that once an attacker takes control of the OS kernel, the …