Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 955
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorHeo, Ingooko
dc.contributor.authorJang, Daeheeko
dc.contributor.authorMoon, Hyungonko
dc.contributor.authorCho, Hansuko
dc.contributor.authorLee, Seungwookko
dc.contributor.authorKang, Brent Byunghoonko
dc.contributor.authorPaek, Yunheungko
dc.date.accessioned2015-11-20T09:06:56Z-
dc.date.available2015-11-20T09:06:56Z-
dc.date.created2015-05-12-
dc.date.created2015-05-12-
dc.date.created2015-05-12-
dc.date.issued2015-02-
dc.identifier.citationJOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.15, no.1, pp.48 - 59-
dc.identifier.issn1598-1657-
dc.identifier.urihttp://hdl.handle.net/10203/201014-
dc.description.abstractIn recent years, there are increasing threats of rootkits that undermine the integrity of a system by manipulating OS kernel. To cope with the rootkits, in Vigilare, the snoop-based monitoring which snoops the memory traffics of the host system was proposed. Although the previous work shows its detection capability and negligible performance loss, the problem is that the proposed design is not acceptable in recent commodity mobile application processors (APs) which have become de facto the standard computing platforms of smart devices. To mend this problem and adopt the idea of snoop-based monitoring in commercial products, in this paper, we propose a snoop-based monitor design called S-Mon, which is designed for the AP platforms. In designing S-Mon, we especially consider two design constraints in the APs which were not addressed in Vigilare; the unified memory model and the crossbar switch interconnect. Taking into account those, we derive a more realistic architecture for the snoop-based monitoring and a new hardware module, called the region controller, is also proposed. In our experiments on a simulation framework modeling a production-quality device, it is shown that our S-Mon can detect the rootkit attacks while the runtime overhead is also negligible.-
dc.languageEnglish-
dc.publisherIEEK PUBLICATION CENTER-
dc.titleEfficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors-
dc.typeArticle-
dc.identifier.wosid000353277200009-
dc.identifier.scopusid2-s2.0-84924128371-
dc.type.rimsART-
dc.citation.volume15-
dc.citation.issue1-
dc.citation.beginningpage48-
dc.citation.endingpage59-
dc.citation.publicationnameJOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE-
dc.identifier.doi10.5573/JSTS.2015.15.1.048-
dc.contributor.localauthorKang, Brent Byunghoon-
dc.contributor.nonIdAuthorHeo, Ingoo-
dc.contributor.nonIdAuthorMoon, Hyungon-
dc.contributor.nonIdAuthorCho, Hansu-
dc.contributor.nonIdAuthorLee, Seungwook-
dc.contributor.nonIdAuthorPaek, Yunheung-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorapplication processor-
dc.subject.keywordAuthorsmart mobile device-
dc.subject.keywordAuthorsnoop-based integrity monitoring-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0