Title :
Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine
Author :
Wen, Yan ; Zhao, Jinjing ; Wang, Huaimin
Author_Institution :
Nat. Univ. of Defense Technol., Changsha
Abstract :
Currently stealth malware is becoming a major threat to the PC computers. Process hiding is the technique commonly used by stealth malware to evade detection by anti-malware scanners. On the defensive side, previous host-based approaches will be defeated once the privileged stealth malware controls a lower reach of the system. The virtual machine (VM) based solutions gain tamper resistance at the cost of losing the OS-level process view. Moreover, existing VM-based approaches cannot introspect the preinstalled OS which is just the protecting concern for PC users. In this paper, we present a new VM-based approach called Libra which accurately reproduces the software environment of the underlying preinstalled OS within the Libra VM and provides an OS-level semantic view of the processes. With our new local-booting technology, Libra VM just boots from the underlying host OS but not a newly installed OS image. Thus, Libra provides a way to detect the existing process-hiding stealth malware in the host OS. In addition, instead of depending on the guest information which is subvertable to the privileged guest malware, Libra adopts a unique technique to implicitly construct the trusted view of process list (TVPL) from within the virtualized hardware layer. Our evaluation results with real-world hiding-process rootkits, which are widely used by stealth malware, demonstrate its practicality and effectiveness.
Keywords :
computer crime; operating systems (computers); virtual machines; Libra virtual machines; OS-level semantic view; PC computers; antimalware scanners; hidden process implicit detection; local-booted virtual machine; local-booting technology; software environment; stealth malware; trusted view of process list; Control systems; Costs; Detectors; Hardware; Information security; Protection; Statistics; Systems engineering and theory; Virtual machining; Virtual manufacturing; Hidden Process; Local-Booted Virtual Machine; Virtual Machine;
Conference_Titel :
Information Security and Assurance, 2008. ISA 2008. International Conference on
Conference_Location :
Busan
Print_ISBN :
978-0-7695-3126-7
DOI :
10.1109/ISA.2008.22