The Community for Technology Leaders
Green Image
Issue No. 02 - March-April (2017 vol. 14)
ISSN: 1545-5971
pp: 145-157
Hyungon Moon , ISRC, Department of Electrical and Computer Engineering, Seoul National University, Gwanak-gu, Seoul, Korea
Hojoon Lee , Graduate School of Information Security, Korea Advanced Institute of Technology, Yuseong, Daejeon, Korea
Ingoo Heo , ISRC, Department of Electrical and Computer Engineering, Seoul National University, Gwanak-gu, Seoul, Korea
Kihwan Kim , Graduate School of Information Security, Korea Advanced Institute of Technology, Yuseong, Daejeon, Korea
Yunheung Paek , ISRC, Department of Electrical and Computer Engineering, Seoul National University, Gwanak-gu, Seoul, Korea
Brent Byunghoon Kang , Graduate School of Information Security, Korea Advanced Institute of Technology, Yuseong, Daejeon, Korea
ABSTRACT
To protect the integrity of operating system kernels, we present Vigilare system, a kernel integrity monitor that is architected to snoop the bus traffic of the host system from a separate independent hardware. This snoop-based monitoringenabled by the Vigilare system, overcomes the limitations of the snapshot-based monitoring employed in previous kernel integrity monitoring solutions. Being based on inspecting snapshots collected over a certain interval, the previous hardware-based monitoring solutions cannot detect transient attacks that can occur in between snapshots, and cannot protect the kernel against permanent damage. We implemented three prototypes of the Vigilare system by adding Snooper hardware connections module to the host system for bus snooping, and a snapshot-based monitor to be comared with, in order to evaluate the benefit of snoop-based monitoring. The prototypes of Vigilare system detected all the transient attacks and the second one protected the kernel with negligible performance degradation while the snapshot-based monitor could not detect all the attacks and induced considerable performance degradation as much as 10 percent in our tuned STREAM benchmark test.
INDEX TERMS
Kernel, Monitoring, Transient analysis, Prototypes, Hardware, Linux, Memory management
CITATION

H. Moon, H. Lee, I. Heo, K. Kim, Y. Paek and B. B. Kang, "Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping," in IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 2, pp. 145-157, 2017.
doi:10.1109/TDSC.2015.2443803
93 ms
(Ver 3.3 (11022016))