このエントリーをはてなブックマークに追加
ID 62323
FullText URL
Author
Akao, Yohei Graduate School of Natural Science and Technology, Okayama University
Yamauchi, Toshihiro Graduate School of Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
Abstract
Attacks on an operating system kernel using kernel rootkits pose a particularly serious threat. Detecting an attack is difficult when the operating system kernel is infected with a kernel rootkit. For this reason, handling an attack will be delayed causing an increase in the amount of damage done to a computer system. In this paper, we discuss KRGuard (Kernel Rootkits Guard), which is a new method to detect kernel rootkits that monitors branch records in the kernel space. Since many kernel rootkits make branches that differ from the usual branches in the kernel space, KRGuard can detect these differences by using hardware features of commodity processors. Our evaluation shows that KRGuard can detect kernel rootkits with small overhead.
Keywords
Security
operating system
kernel rootkit
last branch record
Note
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
3rd International Conference on Information Science and Security (ICISS), Pattaya, Thailand (2016-11-19)
Published Date
2016-12
Publication Title
2016 International Conference on Information Science and Security (ICISS)
Publisher
IEEE
Start Page
22
End Page
26
ISBN
9781509054930
Content Type
Conference Paper
Related Url
isVersionOf https://doi.org/10.1109/icissec.2016.7885860
language
英語
Copyright Holders
© 2016 IEEE
File Version
author
Refereed
True
DOI
Web of Science KeyUT