Hello rootKitty: A lightweight invariance-enforcing framework

05/22/2014
by   Francesco Gadaleta, et al.
0

In monolithic operating systems, the kernel is the piece of code that executes with the highest privileges and has control over all the software running on a host. A successful attack against an operating system's kernel means a total and complete compromise of the running system. These attacks usually end with the installation of a rootkit, a stealthy piece of software running with kernel privileges. When a rootkit is present, no guarantees can be made about the correctness, privacy or isolation of the operating system. In this paper we present Hello rootKitty, an invariance-enforcing framework which takes advantage of current virtualization technology to protect a guest operating system against rootkits. Hello rootKitty uses the idea of invariance to detect maliciously modified kernel data structures and restore them to their original legitimate values. Our prototype has negligible performance and memory overhead while effectively protecting commodity operating systems from modern rootkits.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/15/2019

Neverland: Lightweight Hardware Extensions for Enforcing Operating System Integrity

The security of applications hinges on the trustworthiness of the operat...
research
12/09/2019

Lightweight Container-based User Environment

Modern operating systems all support multi-users that users could share ...
research
06/30/2010

Dynamic and Transparent Analysis of Commodity Production Systems

We propose a framework that provides a programming interface to perform ...
research
10/28/2014

Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture

Many smartphones now deploy conventional operating systems, so the rootk...
research
08/21/2017

Entirely protecting operating systems against transient errors in space environment

In this article, we propose a mainly-software hardening technique to tot...
research
12/24/2022

MProtect: Operating System Memory Management without Access

Modern operating systems (OSes) have unfettered access to application da...
research
01/04/2019

Efficient, Dynamic Multi-tenant Edge Computation in EdgeOS

In the future, computing will be immersed in the world around us – from ...

Please sign up or login with your details

Forgot password? Click here to reset