期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Detecting Compromised Kernel Hooks with Support of Hardware Debugging Features 被引量:3
1
作者 Shi Wenchang Zhou HongWei +1 位作者 Yuan JinHui Liang Bin 《China Communications》 SCIE CSCD 2012年第10期78-90,共13页
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge,... Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%. 展开更多
关键词 operating system kernel hook integrity HARDWARE control flow
在线阅读 下载PDF
OPKH: A Lightweight Online Approach to Protecting Kernel Hooks in Kernel Modules
2
作者 田东海 李轩涯 +1 位作者 胡昌振 闫怀志 《China Communications》 SCIE CSCD 2013年第11期15-23,共9页
Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in t... Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead. 展开更多
关键词 kernel hook virtualization tech-nology online patching
在线阅读 下载PDF
浅谈Kernel EAT HOOK的检测与绕过
3
作者 胡文亮 《黑客防线》 2010年第3期96-99,共4页
网上有关Kernel EAT HOOK的资料很少,我找到的只有一个,就是《黑客防线2009黑客编程VC专辑))中的《恢复Rjng O下的IAT和EATHOOK》。不过这篇文章的全部源码都放在了驱动里,不太安全(个人认为能放在Ring3的代码就放在Ring3,以保... 网上有关Kernel EAT HOOK的资料很少,我找到的只有一个,就是《黑客防线2009黑客编程VC专辑))中的《恢复Rjng O下的IAT和EATHOOK》。不过这篇文章的全部源码都放在了驱动里,不太安全(个人认为能放在Ring3的代码就放在Ring3,以保证稳定)。 展开更多
关键词 编程 Hook kernel EAT HOOK
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部