(A) study on design, implementation, and optimizations of external hardware-based kernel integrity monitor운영체제 커널 무결성 감시를 위한 외부 하드웨어 모니터의 구현과 최적화

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 619
  • Download : 0
Kernel-level malwares poses a grave threat to system security since they operate with the highest privilege within the victimized system. Researchers have sought to establish various Trusted Execution Environ- ment (TEE)that enables reliable detection of such vicious malwares. External hardware-based kernel monitoring has been overlooked in the midst of a plethora of hypervisor-based kernel integrity solutions, and the existing hardware-based monitor is limited to periodic snapshot checks on kernel static regions. In this dissertation, We explore the external hardware-based kernel monitoring approach by presenting the new design,implementations and monitoring techniques of external hardware-based kernel integrity monitors. In this dissertation, we present a event-triggered external hardware-based kernel integrity monitor. With our prototypes, we introduce a new monitoring technique called snoop-based monitoring method- ology against kernel’s both static and dynamic regions. With the snooper module’s event-triggered monitoring we show that our approach can detect transient attacks on kernel static regions that can be missed by snapshot-based monitoring techniques. Furthermore, we present a more advanced monitor- ing platform built around the snooping technique called KI-Mon. KI-Mon advances the snoop-based monitoring with hardware-based memory value whitelisting to selectively allow only certain values to be written on to the monitored memory region. KI-Mon also executes developer-defined kernel integrity verifying routines upon detection of designated memory transaction on the system bus. In this way, we allow developers to write custom kernel integrity verifying (with the KI-Mon API), that are triggered when pre-defined memory transaction pattern appears on the KI-Mon platform. We also present external monitoring aware Linux kernel memory allocator modifications that sim- plifies a number of formidable challenges that are faced by external monitors in general. We slightly modify the kernel’s layered memory allocators (Buddy and SLAB allocator) to congregate only the mon- itored objects into a single contiguous memory region, namely the ZONE MONITORED. In this way, the burdensome task of constantly tracing the monitored kernel object type is eliminated. Furthermore, we report a critical security vulnerability in our external monitor design that may allow adversary to evade the monitoring from the external monitors. The Address Translation Redirection Attack (ATRA) redefines the virtual to physical address translation to relocate the monitored objects and create rogue copies of the objects. We provide a rigorous analysis on Linux kernel’s memory mapping properties. Based on this, we introduce a memory mapping verification scheme for external monitors. In all, this dissertation introduces a series of explorations on external hardware-based kernel integrity monitors. We explain the design, implementation and evaluation of our external monitors and monitoring techniques built on top of them. We hope that our work shed a light on the under explored external kernel integrity monitor approach, and prove to be a feasible solution in kernel integrity monitoring.
Advisors
Kang, Brent Byung Hoonresearcher강병훈researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2018
Identifier
325007
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 정보보호대학원, 2018.2,[vi, 56 p. :]

Keywords

Rootkit▼aKernel Integrity Monitor▼aOS Security▼aMalware▼aSystem Monitoring; 루트킷▼a커널 무결성 감시▼a시스템 모니터▼a악성코드▼a운영체제 보안

URI
http://hdl.handle.net/10203/265360
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=734431&flag=dissertation
Appears in Collection
IS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0