DocumentCode :
2579148
Title :
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Author :
Vasisht, Vikas R. ; Lee, Hsien-Hsin S.
Author_Institution :
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA
fYear :
2008
fDate :
8-12 Nov. 2008
Firstpage :
106
Lastpage :
116
Abstract :
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malwarepsilas activities from users and system administrators without any authorization. Once infected, these malware applications will operate completely in stealth, leaving no trace for administrators and anti-malware tools. Current anti-rootkit solutions try to either strengthen the kernel by removing known vulnerabilities or develop software tools at the OS or virtual machine monitor levels to monitor the integrity of the kernel. Seeing the failure of these software techniques, we propose, in this paper, an autonomic architecture called SHARK, or secure hardware support against rootkit by employing hardware support to provide system-level security without trusting the software stack, including the OS kernel. SHARK enhances the relationship between the OS and the hardware architecture, making the entire system more security-aware in defending rootkits. SHARK proposes new architectural support to provide a secure association between each software context and the underlying hardware. It helps system administrators to obtain feedback directly from the hardware to reveal all running processes, even when the OS kernel is compromised. We emulated the functionality of SHARK by using x86 Bochs and modifying the Linux kernel version 2.6.16.33 based on our proposed architectural extension. Several real rootkits were installed to compromise the kernel and conceal malware processes on our emulated environment. SHARK is shown to be highly effective in identifying a variety of rootkits employing different software schemes. In addition, the performance analysis based on our Simics simulations shows a negligible overhead, making the SHARK architecture highly practical.
Keywords :
invasive software; operating system kernels; system monitoring; virtual machines; autonomic architecture; cyber-security; malware; operating system kernel; rootkit; secure hardware support; system monitoring; virtual machine; Application software; Authorization; Computer architecture; Computer security; Condition monitoring; Hardware; Kernel; Protection; Software tools; Virtual machine monitors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Microarchitecture, 2008. MICRO-41. 2008 41st IEEE/ACM International Symposium on
Conference_Location :
Lake Como
ISSN :
1072-4451
Print_ISBN :
978-1-4244-2836-6
Electronic_ISBN :
1072-4451
Type :
conf
DOI :
10.1109/MICRO.2008.4771783
Filename :
4771783
Link To Document :
بازگشت