Hypervisor-based prevention of persistent rootkits

  • Authors:
  • Yosuke Chubachi;Takahiro Shinagawa;Kazuhiko Kato

  • Affiliations:
  • University of Tsukuba, Tsukuba, Ibaraki, Japan;University of Tsukuba, Tsukuba, Ibaraki, Japan;University of Tsukuba, Tsukuba, Ibaraki, Japan

  • Venue:
  • Proceedings of the 2010 ACM Symposium on Applied Computing
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Rootkits are prevalent in today's Internet. In particular, persistent rootkits pose a serious security threat because they reside in storage and survive system reboots. Using hypervisors is an attractive way to deal with rootkits, especially when the rootkits have kernel privileges, because hypervisors have higher privileges than OS kernels. However, most of the previous studies do not focus on prevention of persistent rootkits. This paper presents a hypervisor-based file protection scheme for preventing persistent rootkits from residing in storage. Based on security policies created in a secure environment, the hypervisor makes critical system files read-only and unmodifiable by rootkits even if they have kernel privileges. Our scheme is designed to significantly reduce the size of hypervisors when combined with the architecture of BitVisor, a thin hypervisor for enforcing I/O device security, thereby contributing to the reliability of hypervisors. Our hypervisor consists of only 37 kilo lines of code in total, and its overhead on Windows XP with a FAT32 file system is only 1.1% -- 14.0%.