[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2463209.2488831acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters

Published: 29 May 2013 Publication History

Abstract

This paper presents NumChecker, a new Virtual Machine Monitor (VMM) based framework to detect control-flow modifying kernel rootkits in a guest Virtual Machine (VM). NumChecker detects malicious modifications to a system call in the guest VM by checking the number of certain hardware events that occur during the system call's execution. To automatically count these events, NumChecker leverages the Hardware Performance Counters (HPCs), which exist in most modern processors. By using HPCs, the checking cost is significantly reduced and the tamper-resistance is enhanced. We implement a prototype of NumChecker on Linux with the Kernelbased Virtual Machine (KVM). Our evaluation demonstrates its practicality and effectiveness.

References

[1]
www.tux.org/pub/benchmarks/System/unixbench/.
[2]
The adore-ng rootkit. http://stealth.7350.org.
[3]
Chkrootkit. http://packetstormsecurity.org/files/62258/chkrootkit-0.48.tar.gz.html.
[4]
Kernel based virtual machine. http://www.linux-kvm.org/page/Main_Page.
[5]
Kstat - kernel security therapy anti-trolls. http://www.s0ftpj.org/en/tools.html.
[6]
Rkhunter. http://packetstormsecurity.org/files/44153/rkhunter-1.2.8.tar.gz.html.
[7]
Performance counters for linux. http://lwn.net/Articles/310176, 2010.
[8]
F. Azmandian, M. Moffie, M. Alshawabkeh, J. G. Dy, J. A. Aslam, and D. R. Kaeli. Virtual machine monitor-based lightweight intrusion detection. ACM SIGOPS Operating Systems Review, 45(2):38--53, July 2011.
[9]
S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, and D. Xu. Dksm: Subverting virtual machine introspection for fun and profit. In Proceedings of the 29th IEEE International Symposium on Reliable Distributed Systems, Oct. 2010.
[10]
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: Malware analysis via hardware virtualization extensions. In Proceedings of ACM conference on Computer and Communications Security, Oct. 2008.
[11]
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proceedings of Network and Distributed Systems Security Symposium, pages 191--206, 2003.
[12]
A. Godiyal, A. Nguyen, and N. Schear. A lightweight hypervisor for malware analysis. http://ivanlef0u.fr/repo/todo/HyperVisorMalware.pdf.
[13]
O. S. Hofmann, A. M. Dunn, S. Kim, I. Roy, and E. Witchel. Ensuring operating system kernel integrity with osck. In Architectural Support for Programming Languages and Operating Systems, March 2011.
[14]
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction. In Proceedings of ACM conference on Computer and communications security, Nov. 2007.
[15]
C. Malone, M. Zahran, and R. Karri. Are hardware performance counters a cost effective way for integrity checking of programs? In The Sixth ACM Workshop on Scalable Trusted Computing, Oct. 2011.
[16]
J. N. L. Petroni and M. Hicks. Automated detection of persistent kernel control-flow attacks. In Proceedings of ACM conference on Computer and Communications Security, pages 103--115, 2007.
[17]
B. Payne, M. de Carbone, and W. Lee. Secure and flexible monitoring of virtual machines. In Computer Security Applications Conference, Dec. 2007.
[18]
B. Payne, M. S. M. Carbone, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. In Proceedings of the IEEE Symposium on Security and Privacy, May 2008.
[19]
J. Pfoh, C. Schneider, and C. Eckert. Nitro: Hardware-based system call tracing for virtual machines. Advances in Information and Computer Security, 7038:96--112, Nov 2011.
[20]
R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In Proceedings of International Symposium on Recent Advances in Intrusion Detection, 2008.
[21]
J. Rutkowska. Execution path analysis: finding kernel based rootkits. Phrack Article, 11, 2002.
[22]
Sd and Devik. Linux on-the-fly kernel patching without lkm. Phrack Magazine, 11, Jan. 2004.
[23]
A. Srivastava and J. Giffin. Tamper-resistant, application-aware blocking of malicious network connections. In Proceedings of International Symposium on Recent Advances in Intrusion Detection, pages 39--58, 2008.
[24]
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM conference on Computer and Communications Security, pages 545--554, Nov. 2009.

Cited By

View all
  • (2024)Intelligent Malware Detection based on Hardware Performance Counters: A Comprehensive Survey2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528369(1-10)Online publication date: 3-Apr-2024
  • (2024)Profiling with trust: system monitoring from trusted execution environmentsDesign Automation for Embedded Systems10.1007/s10617-024-09283-128:1(23-44)Online publication date: 1-Mar-2024
  • (2023)HyPFuzzProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620314(1361-1378)Online publication date: 9-Aug-2023
  • Show More Cited By

Index Terms

  1. NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      DAC '13: Proceedings of the 50th Annual Design Automation Conference
      May 2013
      1285 pages
      ISBN:9781450320719
      DOI:10.1145/2463209
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 May 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. hardware performance counters
      2. kernel rootkits
      3. virtualization

      Qualifiers

      • Research-article

      Conference

      DAC '13
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

      Upcoming Conference

      DAC '25
      62nd ACM/IEEE Design Automation Conference
      June 22 - 26, 2025
      San Francisco , CA , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)18
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 01 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Intelligent Malware Detection based on Hardware Performance Counters: A Comprehensive Survey2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528369(1-10)Online publication date: 3-Apr-2024
      • (2024)Profiling with trust: system monitoring from trusted execution environmentsDesign Automation for Embedded Systems10.1007/s10617-024-09283-128:1(23-44)Online publication date: 1-Mar-2024
      • (2023)HyPFuzzProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620314(1361-1378)Online publication date: 9-Aug-2023
      • (2023)Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUsProceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583655(177-188)Online publication date: 24-Apr-2023
      • (2023)Leveraging Hardware Performance Counters for Efficient Classification of Binary Packers2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00252(1859-1864)Online publication date: 1-Nov-2023
      • (2023)Enhancing IoT Security: Novel Mechanisms for Malware Detection using HPCs and Neural Networks2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00199(1455-1463)Online publication date: 1-Nov-2023
      • (2023)Hardware Performance Counter Enhanced Watchdog for Embedded Software Security2023 24th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED57927.2023.10129291(1-8)Online publication date: 5-Apr-2023
      • (2023)Exploration and Exploitation of Hidden PMU Events2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)10.1109/ICCAD57390.2023.10323695(1-9)Online publication date: 28-Oct-2023
      • (2023)Decoy Processes With Optimal Performance FingerprintsIEEE Access10.1109/ACCESS.2023.327199911(43216-43237)Online publication date: 2023
      • (2023)A comprehensive survey on hardware-assisted malware analysis and primitive techniquesComputer Networks10.1016/j.comnet.2023.109967235(109967)Online publication date: Nov-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media