DocumentCode :
2837906
Title :
A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table
Author :
Levine, J.G. ; Grizzard, J.B. ; Hutto, P.W. ; Owen, H.L.
Author_Institution :
Georgia Institute of Technology
fYear :
2004
fDate :
26-29 March 2004
Firstpage :
25
Lastpage :
31
Abstract :
A cracker who gains access to a computer system will normally install some method, for use at a later time that allows the cracker to come back onto the system with root privilege. One method that a cracker may use is the installation of a rootkit on the compromised system. A kernel level rootkit will modify the underlying kernel of the installed operating system. The kernel controls everything that happens on a computer. We are developing a standardized methodology to characterize rootkits. The ability to characterize rootkits will provide system administrators, researchers, and security personnel with the information necessary in order to take the best possible recovery actions. This may also help to detect and fingerprint additional instances and prevent further security instances involving rootkits. We propose new methods for characterizing kernel level rootkits. These methods may also be used in the detection of kernel rootkits.
Keywords :
Computer crime; Computer hacking; Computer networks; Fingerprint recognition; Information security; Kernel; Memory management; Operating systems; Permission; Personnel;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
SoutheastCon, 2004. Proceedings. IEEE
Conference_Location :
Greensboro, North Carolina, USA
Print_ISBN :
0-7803-8368-0
Type :
conf
DOI :
10.1109/SECON.2004.1287894
Filename :
1287894
Link To Document :
بازگشت