ID | 62323 |
FullText URL | |
Author |
Akao, Yohei
Graduate School of Natural Science and Technology, Okayama University
Yamauchi, Toshihiro
Graduate School of Natural Science and Technology, Okayama University
ORCID
Kaken ID
publons
researchmap
|
Abstract | Attacks on an operating system kernel using kernel rootkits pose a particularly serious threat. Detecting an attack is difficult when the operating system kernel is infected with a kernel rootkit. For this reason, handling an attack will be delayed causing an increase in the amount of damage done to a computer system. In this paper, we discuss KRGuard (Kernel Rootkits Guard), which is a new method to detect kernel rootkits that monitors branch records in the kernel space. Since many kernel rootkits make branches that differ from the usual branches in the kernel space, KRGuard can detect these differences by using hardware features of commodity processors. Our evaluation shows that KRGuard can detect kernel rootkits with small overhead.
|
Keywords | Security
operating system
kernel rootkit
last branch record
|
Note | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
3rd International Conference on Information Science and Security (ICISS), Pattaya, Thailand (2016-11-19)
|
Published Date | 2016-12
|
Publication Title |
2016 International Conference on Information Science and Security (ICISS)
|
Publisher | IEEE
|
Start Page | 22
|
End Page | 26
|
ISBN | 9781509054930
|
Content Type |
Conference Paper
|
Related Url | isVersionOf https://doi.org/10.1109/icissec.2016.7885860
|
language |
English
|
Copyright Holders | © 2016 IEEE
|
File Version | author
|
Refereed |
True
|
DOI | |
Web of Science KeyUT |