DocumentCode :
1601318
Title :
Cloaker: Hardware Supported Rootkit Concealment
Author :
David, Francis M. ; Chan, Ellick M. ; Carlyle, Jeffrey C. ; Campbell, Roy H.
Author_Institution :
Dept. of Comput. Sci., Univ. of Illinois at Urbana-Champaign, Urbana, IL
fYear :
2008
Firstpage :
296
Lastpage :
310
Abstract :
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of the ongoing struggle between attackers and system defenders. In order to explore the next step in rootkit evolution and to build strong defenses, we look at this issue from the point of view of an attacker. We construct Cloaker, a proof-of-concept rootkit for the ARM platform that is non- persistent and only relies on hardware state modifications for concealment and operation. A primary goal in the design of Cloaker is to not alter any part of the host operating system (OS) code or data, thereby achieving immunity to all existing rootkit detection techniques which perform integrity, behavior and signature checks of the host OS. Cloaker also demonstrates that a self-contained execution environment for malicious code can be provided without relying on the host OS for any services. Integrity checks of hardware state in each of the machine´s devices are required in order to detect rootkits such as Cloaker. We present a framework for the Linux kernel that incorporates integrity checks of hardware state performed by device drivers in order to counter the threat posed by rootkits such as Cloaker.
Keywords :
Linux; security of data; Cloaker; Linux kernel; device drivers; hardware state modifications; hardware supported rootkit concealment; malicious attackers; rootkit detection techniques; system defenders; Computer science; Computer security; Counting circuits; Hardware; Immune system; Kernel; Mobile handsets; Operating systems; Privacy; Virtual machining; ARM; operating system; rootkit; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 2008. SP 2008. IEEE Symposium on
Conference_Location :
Oakland, CA
ISSN :
1081-6011
Print_ISBN :
978-0-7695-3168-7
Type :
conf
DOI :
10.1109/SP.2008.8
Filename :
4531160
Link To Document :
بازگشت