Vigilare: Toward Snoop-based Kernel Integrity Monitor

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 326
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorMoon, Hyun Gonko
dc.contributor.authorLee, Ho Joonko
dc.contributor.authorLee, Ji Hoonko
dc.contributor.authorKim, Ki Hwanko
dc.contributor.authorPaek, Yun Heungko
dc.contributor.authorKang, Brent Byunghoonko
dc.date.accessioned2016-07-13T07:28:22Z-
dc.date.available2016-07-13T07:28:22Z-
dc.date.created2016-01-01-
dc.date.created2016-01-01-
dc.date.created2016-01-01-
dc.date.created2016-01-01-
dc.date.issued2012-10-16-
dc.identifier.citation2012 ACM Conference on Computer and Communications Security, CCS 2012, pp.28 - 37-
dc.identifier.urihttp://hdl.handle.net/10203/211567-
dc.description.abstractIn this paper, we present Vigilare system, a kernel integrity monitor that is architected to snoop the bus traffic of the host system from a separate independent hardware. This snoop-based monitoring enabled by the Vigilare system, overcomes the limitations of the snapshot-based monitoring employed in previous kernel integrity monitoring solutions. Being based on inspecting snapshots collected over a certain interval, the previous hardware-based monitoring solutions cannot detect transient attacks that can occur in between snapshots. We implemented a prototype of the Vigilare system on Gaisler's grlib-based system-on-a-chip (SoC) by adding Snooper hardware connections module to the host system for bus snooping. To evaluate the benefit of snoopbased monitoring, we also implemented similar SoC with a snapshot-based monitor to be compared with. The Vigilare system detected all the transient attacks without performance degradation while the snapshot-based monitor could not detect all the attacks and induced considerable performance degradation as much as 10% in our tuned STREAM benchmark test.-
dc.languageEnglish-
dc.publisherACM Special Interest Group on Security, Audit and Control (SIGSAC)-
dc.titleVigilare: Toward Snoop-based Kernel Integrity Monitor-
dc.typeConference-
dc.identifier.scopusid2-s2.0-84869408742-
dc.type.rimsCONF-
dc.citation.beginningpage28-
dc.citation.endingpage37-
dc.citation.publicationname2012 ACM Conference on Computer and Communications Security, CCS 2012-
dc.identifier.conferencecountryUS-
dc.identifier.doi10.1145/2382196.2382202-
dc.contributor.localauthorKang, Brent Byunghoon-
dc.contributor.nonIdAuthorMoon, Hyun Gon-
dc.contributor.nonIdAuthorLee, Ji Hoon-
dc.contributor.nonIdAuthorPaek, Yun Heung-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0