Shepherding Loadable Kernel Modules through On-demand Emulation

  • Authors:
  • Chaoting Xuan;John Copeland;Raheem Beyah

  • Affiliations:
  • School of Electrical and Computer Engineering, Georgia Institute of Technology,;School of Electrical and Computer Engineering, Georgia Institute of Technology,;School of Electrical and Computer Engineering, Georgia Institute of Technology, and Department of Computer Science, Georgia State University,

  • Venue:
  • DIMVA '09 Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Despite many advances in system security, rootkits remain a threat to major operating systems. First, this paper discusses why kernel integrity verification is not sufficient to counter all types of kernel rootkits and a confidentiality-violation rootkit is demonstrated to evade all integrity verifiers. Then, the paper presents, DARK, a rootkit prevention system that tracks a suspicious loadable kernel module at a granite level by using on-demand emulation, a technique that dynamically switches a running system between virtualized and emulated execution. Combining the strengths of emulation and virtualization, DARK is able to thoroughly capture the activities of the target module in a guest OS, while maintaining reasonable run-time performance. To address integrity-violation and confidentiality-violation rootkits, we create a group of security policies that can detect all avialiable Linux rootkits. Finally, it is shown that normal guest OS performance is unaffected. The performance is only decreased when rootkits attempt to run, while most rootkits are detected at installation.