Countering Kernel Malware in Virtual Execution Environments false
By:Chaoting Xuan
Published on 2009 by
We present a rootkit prevention system, namely DARK that tracks suspicious Linux loadable kernel modules (LKM) at a granular level by using on-demand emulation, a technique that dynamically switches a running system between virtualized and emulated execution. Combining the strengths of emulation and virtualization, DARK is able to thoroughly capture the activities of the target module in a guest operating system (OS), while maintaining reasonable run-time performance. To address integrity-violation and confidentiality-violation rootkits, we create a group of security policies that can detect all available Linux rootkits. It is shown that normal guest OS performance is unaffected. The performance is only decreased when rootkits attempt to run, while most rootkits are detected at installation. Next, we present a sandbox-based malware analysis system called Rkprofiler that dynamically monitors and analyzes the behavior of Windows kernel malware. Kernel malware samples run inside a virtual machine (VM) that is supported and managed by a PC emulator. Rkprofiler provides several capabilities that other malware analysis systems do not have. First, it can detect the execution of malicious kernel code regardless of how the monitored kernel malware is loaded into the kernel and whether it is packed or not. Second, it captures all function calls made by the kernel malware and constructs call graphs from the trace files. Third, a technique called aggressive memory tagging (AMT) is proposed to track the dynamic data objects that the kernel malware visits. Last, Rkprofiler records and reports the hardware access events of kernel malware (e.g., MSR register reads and writes). Our evaluation results show that Rkprofiler can quickly expose the security-sensitive activities of kernel malware and thus reduces the effort exerted in conducting tedious manual malware analysis.
This Book was ranked at 35 by Google Books for keyword Kernel.
Book ID of Countering Kernel Malware in Virtual Execution Environments's Books is OGZNAQAACAAJ, Book which was written byChaoting Xuanhave ETAG "hn3qdgLL5HM"
Book which was published by since 2009 have ISBNs, ISBN 13 Code is and ISBN 10 Code is
Reading Mode in Text Status is false and Reading Mode in Image Status is false
Book which have " Pages" is Printed at BOOK under CategoryComputer networks
Book was written in en
eBook Version Availability Status at PDF is falseand in ePub is false
Book Preview
Countering Kernel Malware in Virtual Execution Environments Free Download
Countering Kernel Malware in Virtual Execution Environments PDF Free
Countering Kernel Malware in Virtual Execution Environments PDF
Countering Kernel Malware in Virtual Execution Environments Free
Countering Kernel Malware in Virtual Execution Environments Books
Countering Kernel Malware in Virtual Execution Environments Books Free
Countering Kernel Malware in Virtual Execution Environments Audio Books
Countering Kernel Malware in Virtual Execution Environments full-text Books
Countering Kernel Malware in Virtual Execution Environments Online Read
Countering Kernel Malware in Virtual Execution Environments Kindle
Countering Kernel Malware in Virtual Execution Environments Review
Countering Kernel Malware in Virtual Execution Environments Book Summary
Countering Kernel Malware in Virtual Execution Environments Book PDF
Countering Kernel Malware in Virtual Execution Environments Book Review
Countering Kernel Malware in Virtual Execution Environments -Chaoting Xuan- Google Books
Countering Kernel Malware in Virtual Execution Environments byChaoting Xuan- Goodreads
Countering Kernel Malware in Virtual Execution Environments byChaoting Xuan
Countering Kernel Malware in Virtual Execution Environments -Chaoting Xuan-
Countering Kernel Malware in Virtual Execution Environments -Chaoting Xuan-
Countering Kernel Malware in Virtual Execution Environments E-Books
Countering Kernel Malware in Virtual Execution Environments byChaoting XuanE-Books
Countering Kernel Malware in Virtual Execution Environments byChaoting Xuanebooks
Countering Kernel Malware in Virtual Execution Environments byChaoting Xuan- Full Text Free Book - Full Text Archive
Countering Kernel Malware in Virtual Execution Environments byChaoting Xuan- Full Text Free Book
Countering Kernel Malware in Virtual Execution Environments byChaoting Xuan- Full Text Archive
Amazon.com: Countering Kernel Malware in Virtual Execution Environments byChaoting Xuan
Komentar
Posting Komentar