filmov
tv
Numchecker: A System Approach for Kernel Rootkit Detection
Показать описание
by Xueyang Wang & Xiaofei Guo
Kernel rootkits are stealthy and can have unrestricted access to system resources. In our talk, we will present NumChecker, a new Virtual Machine Monitor (VMM) based framework to detect and identify control-flow modifying kernel rootkits in a guest Virtual Machine (VM). NumChecker detects and identifies malicious modifications to a system call in the guest VM by measuring low-level events that occur during the system call's execution.
To efficiently measure these events, NumChecker leverages the Hardware Performance Counters (HPCs) in modern processors. HPCs today are able to measure a large number of low-level events that are related to program behavior. We implement NumChecker on Linux with the Kernel-based Virtual Machine. The results on a number of real-world kernel rootkits show that NumChecker is practical and effective.
Kernel rootkits are stealthy and can have unrestricted access to system resources. In our talk, we will present NumChecker, a new Virtual Machine Monitor (VMM) based framework to detect and identify control-flow modifying kernel rootkits in a guest Virtual Machine (VM). NumChecker detects and identifies malicious modifications to a system call in the guest VM by measuring low-level events that occur during the system call's execution.
To efficiently measure these events, NumChecker leverages the Hardware Performance Counters (HPCs) in modern processors. HPCs today are able to measure a large number of low-level events that are related to program behavior. We implement NumChecker on Linux with the Kernel-based Virtual Machine. The results on a number of real-world kernel rootkits show that NumChecker is practical and effective.
Numchecker: A System Approach for Kernel Rootkit Detection
Numchecker A System Approach for Kernel Rootkit Detection
Detect Kernel-Mode Rootkits via Real Time Logging & Controlling Memory Access
Everything You need to know about rootkits - Rootkits - rootkits take admin access
The Correct Way To Remove 'Zero Access Root Kit Trojan' From A PC or Laptop
Demigod: The Art of Emulating Kernel Rootkits
Chkrootkit: Check Your System For Hidden Rootkits
Syslogk Linux Kernel Rootkit - Executing Bots via “Magic Packets” - David Álvarez Pérez
Kernel Mod Rootkits on Modern Linux Systems (by Alex Caceres)
Day 2 Part 1: Rootkits: What they are, and how to find them
MemoryMon: Analyzing Turla Rootkit
Linux Kernel Rootkits - Matveychikov & f0rb1dd3n - H2HC 2018
Memory Diff Analysis of Average Coder Linux Rootkit
PoC UEFI firmware rootkit steals secrets from virtual machines
Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing
Remove New ZeroAccess / Sirefef / MAX++ Rootkit 2013
Almost invisible rootkit for x64: IRP hook kernel keylogger part_1
Breaching the Depths of the Abyss: Exposing Rootkits and Bootkits
Kernel Rootkit Simple Demo for CentOS 6.5
Kernel Rootkit
You Can’t See Me: A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet
Reversing and Malware Analysis Training - Rootkit Analysis Demo3 (darkmegi/waltrodock)
Unix & Linux: How to detect rootkit linux kernel module based?
Windows Programming - Rootkits Detection Basics 3 - Modifying Memory
Комментарии