A dynamic per-context verification of kernel address integrity from external monitors

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 889
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Hojoonko
dc.contributor.authorKim, Minsuko
dc.contributor.authorPaek, Yunheungko
dc.contributor.authorKang, Brent Byunghoonko
dc.date.accessioned2018-11-12T04:53:41Z-
dc.date.available2018-11-12T04:53:41Z-
dc.date.created2018-11-05-
dc.date.created2018-11-05-
dc.date.issued2018-08-
dc.identifier.citationCOMPUTERS & SECURITY, v.77, pp.824 - 837-
dc.identifier.issn0167-4048-
dc.identifier.urihttp://hdl.handle.net/10203/246591-
dc.description.abstractThe introduction of Address Translation Redirection Attack (ATRA) has revealed a critical weakness in all existing hardware-based external kernel integrity monitors. The attack redefines system's memory mappings in favor of the attacker so that the monitored kernel regions are relocated out of the monitor's sight. We provide a generalized approach and a prototype evaluation to prove our proposed scheme for ensuring the integrity of kernel address mapping from external monitors. With a slight modification on the hardware-side on the host, we were able to enable the monitor to continuously trace Page Table Base Register (PTBR) of the host which is an essential capability in monitoring the host memory mapping integrity. In conjunction with this hardware feature, we incorporate our findings on the invariant of the kernel memory mapping patterns to implement a dynamic per-context page table monitoring scheme. Our experiment proves the viability of our work in terms of its effectiveness against memory mapping manipulation attacks such as ATRA and satisfies the time constraints required by the proposed per-context mapping verification scheme. (C) 2018 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.titleA dynamic per-context verification of kernel address integrity from external monitors-
dc.typeArticle-
dc.identifier.wosid000447358600051-
dc.identifier.scopusid2-s2.0-85047797922-
dc.type.rimsART-
dc.citation.volume77-
dc.citation.beginningpage824-
dc.citation.endingpage837-
dc.citation.publicationnameCOMPUTERS & SECURITY-
dc.identifier.doi10.1016/j.cose.2018.02.013-
dc.contributor.localauthorKang, Brent Byunghoon-
dc.contributor.nonIdAuthorPaek, Yunheung-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorExternal kernel integrity monitor-
dc.subject.keywordAuthorAddress translation redirection attack-
dc.subject.keywordAuthorMemory mapping integrity-
dc.subject.keywordAuthorKernel security-
dc.subject.keywordAuthorHardware-based kernel monitor-
dc.subject.keywordAuthorSystem security-
dc.subject.keywordAuthorRootkit-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0