A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation

  • Authors:
  • Woei-Jiunn Tsaur;Yuh-Chen Chen;Being-Yu Tsai

  • Affiliations:
  • Department of Information Management, Da-Yeh University, Taiwan, R.O.C.;Department of Information Management, Da-Yeh University, Taiwan, R.O.C.;Department of Information Management, Da-Yeh University, Taiwan, R.O.C.

  • Venue:
  • ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In 2005, Sony-BMG used a rootkit to conceal the digital right management software, which is aptly installed in consumers' computers to prevent unauthorized copying. As a result, it lets the installed rootkit computers provide malware with excellent shelters to be capable of escaping anti-virus detection easily. We can observe that more and more malware writers are taking advantage of rootkits to shield their illegal activities. In this paper, we develop a new Windows driver-hidden rootkit with five tricks based on Direct Kernel Object Manipulation (DKOM), and have verified that it can successfully avoid well-known rootkit detectors. Our research goal is to find out the weaknesses of current detectors, and expect detector developers pay much attention to them and upgrade their products in order to identify the proposed new rookit. We affirm our efforts will be useful for stimulating detector developers to improve the current techniques of detecting Windows Driver-Hidden Rootkits.