메뉴 건너뛰기




Volumn 5230 LNCS, Issue , 2008, Pages 21-38

Countering persistent kernel rootkits through systematic hook discovery

Author keywords

[No Author keywords available]

Indexed keywords

CONCEPT SYSTEMS; DETECTION SOFTWARES; EXECUTION PATHS; MALWARE; MANUAL ANALYSIS; NETWORK ACTIVITIES; ROOTKITS; SECURITY PROGRAMS; SYSTEMATIC APPROACHES;

EID: 56549113546     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-87403-4_2     Document Type: Conference Paper
Times cited : (43)

References (24)
  • 1
    • 56549095956 scopus 로고    scopus 로고
    • The adore Rootkit, http: //lwn.net/Articles/75990/
    • The adore Rootkit, http: //lwn.net/Articles/75990/
  • 2
    • 56549094182 scopus 로고    scopus 로고
    • The Hideme Rootkit, http://www.sophos.com/security/analyses/viruses-and- spyware/trojhidemea.html
    • The Hideme Rootkit
  • 4
    • 56549091606 scopus 로고    scopus 로고
    • VMware, http://www.vmware.com/
    • VMware
  • 8
    • 56549093645 scopus 로고    scopus 로고
    • Butler, J.: VICE2.0, http://www.infosecinstitute.com/blog/README_VICE.txt
    • Butler, J.: VICE2.0, http://www.infosecinstitute.com/blog/README_VICE.txt
  • 9
    • 85062418620 scopus 로고    scopus 로고
    • Chen, S., Xu, J., Sezer, E.G., Gauriar, P., Iyer, R.: Non-Control-Data Attacks Are Realistic Threats. In: Proc. USENIX Security Symposium (August 2005)
    • Chen, S., Xu, J., Sezer, E.G., Gauriar, P., Iyer, R.: Non-Control-Data Attacks Are Realistic Threats. In: Proc. USENIX Security Symposium (August 2005)
  • 11
    • 38149053957 scopus 로고    scopus 로고
    • Jiang, X., Wang, X.: Out-of-the-Box Monitoring of VM-Based High-Interaction Honeypots. In: Krucgcl, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 198-218. Springer, Heidelberg (2007)
    • Jiang, X., Wang, X.: "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. In: Krucgcl, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 198-218. Springer, Heidelberg (2007)
  • 13
    • 84991799247 scopus 로고    scopus 로고
    • Petroni, N., Fraser, T., Walters, A., Arbaugh, W.: An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. In: Proc. of the 15th USENIX Security Symposium (August 2006)
    • Petroni, N., Fraser, T., Walters, A., Arbaugh, W.: An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. In: Proc. of the 15th USENIX Security Symposium (August 2006)
  • 14
    • 50249114395 scopus 로고    scopus 로고
    • Automated Detection of Persistent Kernel Control-Flow Attacks
    • October
    • Petroni, N., Hicks, M.: Automated Detection of Persistent Kernel Control-Flow Attacks. In: Proc. of ACM CCS 2007 (October 2007)
    • (2007) Proc. of ACM CCS
    • Petroni, N.1    Hicks, M.2
  • 15
    • 85084162914 scopus 로고    scopus 로고
    • Petroni, N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. In: Proc. of the 13th USENIX Security Symposium (August 2004)
    • Petroni, N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. In: Proc. of the 13th USENIX Security Symposium (August 2004)
  • 19
    • 56549085389 scopus 로고    scopus 로고
    • sd.: Linux on-the-fly kernel patching without LKM. Phrack 11(58), article 7 of 15 (2001)
    • sd.: Linux on-the-fly kernel patching without LKM. Phrack 11(58), article 7 of 15 (2001)
  • 20
    • 70449824733 scopus 로고    scopus 로고
    • Seshadri, A., Luk, M., Qu, N., Perrig, A.: Sec Visor: A Tiny Hypervisor to Guarantee Lifetime Kernel Code Integrity for Commodity OSes. In: Proc, of the ACM SOSP 2007 (October 2007)
    • Seshadri, A., Luk, M., Qu, N., Perrig, A.: Sec Visor: A Tiny Hypervisor to Guarantee Lifetime Kernel Code Integrity for Commodity OSes. In: Proc, of the ACM SOSP 2007 (October 2007)
  • 21
    • 27544461178 scopus 로고    scopus 로고
    • Wang, Y., Beck, D., Vo, B., Roussev, R., Verbowski, C.: Detecting Stealth Software with Stridcr GhostBuster. In: Proc. of the 2005 International Conference on Dependable Systems and Networks (June 2005)
    • Wang, Y., Beck, D., Vo, B., Roussev, R., Verbowski, C.: Detecting Stealth Software with Stridcr GhostBuster. In: Proc. of the 2005 International Conference on Dependable Systems and Networks (June 2005)
  • 22
    • 38149096122 scopus 로고    scopus 로고
    • Wilhelm, J., Chiueh, T.-c.: A Forced Sampled Execution Approach to Kernel Rootldt Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 219-235. Springer, Heidelberg (2007)
    • Wilhelm, J., Chiueh, T.-c.: A Forced Sampled Execution Approach to Kernel Rootldt Identification. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 219-235. Springer, Heidelberg (2007)
  • 23
    • 85180628591 scopus 로고    scopus 로고
    • HookFindcr: Identifying and Understanding Malware Hooking Behaviors
    • February
    • Yin, H., Liang, Z., Song, D.: HookFindcr: Identifying and Understanding Malware Hooking Behaviors. In: Proc. of ISOC NDSS 2008 (February 2008)
    • (2008) Proc. of ISOC NDSS
    • Yin, H.1    Liang, Z.2    Song, D.3
  • 24
    • 0038262825 scopus 로고    scopus 로고
    • Zhang, X., Gupta, R., Zhang, Y.: Precise Dynamic Slicing Algorithms. In: Proc. of the IEEE/ACM International Conference on Software Engineering (May 2003)
    • Zhang, X., Gupta, R., Zhang, Y.: Precise Dynamic Slicing Algorithms. In: Proc. of the IEEE/ACM International Conference on Software Engineering (May 2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.