DocumentCode :
182017
Title :
The SMM Rootkit Revisited: Fun with USB
Author :
Schiffman, Joshua ; Kaplan, David
Author_Institution :
Security Archit. R&D, Adv. Micro Devices, Inc., Austin, TX, USA
fYear :
2014
fDate :
8-12 Sept. 2014
Firstpage :
279
Lastpage :
286
Abstract :
System Management Mode (SMM) in x86 has enabled a new class of malware with incredible power to control physical hardware that is virtually impossible to detect by the host operating system. Previous SMM root kits have only scratched the surface by modifying kernel data structures and trapping on I/O registers to implement PS/2 key loggers. In this paper, we present new SMM-based malware that hijacks Universal Serial Bus (USB) host controllers to intercept USB events. This enables SMM root kits to control USB devices directly without ever permitting the OS kernel to receive USB-related hardware interrupts. Using this approach, we created a proof-of-concept USB key logger that is also more difficult to detect than prior SMM-based key loggers that are triggered on OS actions like port I/O. We also propose additional extensions to this technique and methods to prevent and mitigate such attacks.
Keywords :
data structures; input-output programs; invasive software; operating system kernels; peripheral interfaces; I/O registers; OS kernel; PS/2 key loggers; SMM rootkit; SMM-based key loggers; SMM-based malware; USB devices; USB-related hardware interrupts; host operating system; kernel data structures; proof-of-concept USB key logger; system management mode rootkit; universal serial bus; Hardware; Kernel; Keyboards; Linux; Program processors; Registers; Universal Serial Bus; Computer security; Embedded software; Universal Serial Bus;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security (ARES), 2014 Ninth International Conference on
Conference_Location :
Fribourg
Type :
conf
DOI :
10.1109/ARES.2014.44
Filename :
6980293
Link To Document :
بازگشت