VMM-based hidden process detection and identification using Lycosid
ST Jones, AC Arpaci-Dusseau… - Proceedings of the …, 2008 - dl.acm.org
ST Jones, AC Arpaci-Dusseau, RH Arpaci-Dusseau
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on …, 2008•dl.acm.orgUse of stealth rootkit techniques to hide long-lived malicious processes is a current and
alarming security issue. In this paper, we describe, implement, and evaluate a novel VMM-
based hidden process detection and identification service called Lycosid that is based on
the cross-view validation principle. Like previous VMM-based security services, Lycosid
benefits from its protected location. In contrast top revious VMM-based hidden process
detectors, Lycosid obtains guest process information implicitly. Using implicit information …
alarming security issue. In this paper, we describe, implement, and evaluate a novel VMM-
based hidden process detection and identification service called Lycosid that is based on
the cross-view validation principle. Like previous VMM-based security services, Lycosid
benefits from its protected location. In contrast top revious VMM-based hidden process
detectors, Lycosid obtains guest process information implicitly. Using implicit information …
Use of stealth rootkit techniques to hide long-lived malicious processes is a current and alarming security issue. In this paper, we describe, implement, and evaluate a novel VMM-based hidden process detection and identification service called Lycosid that is based on the cross-view validation principle. Like previous VMM-based security services, Lycosid benefits from its protected location. In contrast top revious VMM-based hidden process detectors, Lycosid obtains guest process information implicitly. Using implicit information reduces its susceptibility to guest evasion attacks and decouples it from specific guest operating system versions and patch levels. The implicit information Lycosid depends on, however, can be noisy and unreliable. Statistical inference techniques like hypothesis testing and line arregression allow Lycosid to trade time for accuracy. Despite low quality inputs, Lycosid provides a robust, highly accurate service usable even insecurity environments where the consequences for wrong decisions can behig.
ACM Digital Library