期刊文献+

基于虚拟机架构的内核Rootkit防范方案 被引量:5

Virtual machine based method to prevent kernel Rootkits
下载PDF
导出
摘要 内核Rootkit是运行在操作系统内核空间的恶意程序,对系统安全构成巨大威胁。研究表明,内核Rootkit的共同特征是修改内核的程序控制流程。分析了Linux内核中影响程序控制流程的资源,并通过对这些资源进行保护,来防止Rootkit对内核控制流程的篡改。实验表明,该方法能够有效防止多种Rootkit对Linux内核的攻击。 Kernel Rootkit runs in the kernel space of the operating system and is a huge threat to the security of computer system.Previous research shows that nearly all Rootkits modify the control flow of the OS kernel.The paper identifies the resources which affect kernel control flow in Linux.By protecting these resources in the OS kernel,the kernel control flow can be prevented from being compromised.Experiments show that this method can effectively defend against a variety of Linux kernel Rootkits.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第11期72-74,127,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.90818012 中国科学院重要方向项目(No.KGCX2-YW-125) 北京市科委项目(No.Z08000102000801)~~
关键词 ROOTKIT 虚拟机 完整性保护 Rootkit virtual machine integrity protection
  • 相关文献

参考文献5

  • 1Seshadri A,Luk M, Qu N, et al.SecVisor:A tiny hypervisor to guarantee lifetime kernel code integrity for commodity OSes[C]// Proceedings of the ACM Symposium on Operating Systems Principles,SOSP 2007,October 2007.
  • 2Riley R, Jiang Xuxian,Xu Dongyan.Guest-transparent prevention of kernel rootkits with VMM-based memory shadowing[C]//Pro- ceedings of the llth International Symposium on Recent Ad- vances in Intrusion Detection,September 15-17 2008.
  • 3Barham P, Dragovic B, Fraser K.Xen and the art of virtualiza- tion[C]//Proceedings of the Nineteenth ACM Symposium on Op- erating Systems Principles,October 19-22 2003.
  • 4Petroni Jr N L,Hicks M.Automated detection of persistent kernel control flow attacks[C]//Proceedings of the ACM Conference on Computer and Communications Security,CCS 2007,October 2007.
  • 5Kruegel C,Robertson W, Vigna G.Detecting kernel-level rootkits through binary analysis[C]//Computer Security Applications Con- ference,December 2004.

同被引文献54

  • 1蔡嵩松,刘奇,沈海华,章隆兵.跨平台系统级虚拟机的访存优化[J].计算机研究与发展,2012,49(S1):131-136. 被引量:2
  • 2王春海.虚拟机技术与应用[M].北京:清华大学出版社,2006.
  • 3NSA. Information Security Terms Glossary [ S/OL]. 2005. ht- tps ://www. key. com/html/bank - infonnation - security- glos- sary. html.
  • 4Kruegel C, Robertson W, Vigna G. Detecting kernel-level Ro- otkits through binary, analysis[ C]//Proc of the 20th Annual Computer Security Applications Conference. Washington D C : IEEE Computer Society,2004:91-100.
  • 5Seshadri A, Luk M, Qu N, et al. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodi .ty OSes [ C]//Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP'07). [ s. l. ] : [ s. n. ] ,2007:335- 350.
  • 6Wichmann R. kern_check [ CP/OL]. 2006. http://www, la- samhna, de/library/kem_check, c.
  • 7Kad. checkidt [ CP/OL]. 2007. http://www, phlnck, conv'ar- chives/59/p59- 0x04_ Handling% 20the% 201nten'upt% 20Desc.
  • 8Branco R R, Correia L J H. StMichael:Protecting the Linux Kernel Integrity[ J/OL ]. 2006. http ://www. thebugmagazine.org/magazine/bugO2/OxO7_stmichael, txt.
  • 9龚友.Linux下内核级Rootkit检测防护机制的研究[D].成都:电子科技大学,2006.
  • 10Sinch A. An introduction to virtualization [ J/OL]. 2006-05- 12. http://www, kemehhread, com/publications/virtualiza- tion.

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部