AA monitorAA 모니터 : 주소 변환 재배치 공격에 대한 효과적인 방어

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 847
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKang, Brent ByungHoon-
dc.contributor.advisor강병훈-
dc.contributor.authorKim, Daegyeong-
dc.contributor.author김대경-
dc.date.accessioned2017-03-29T02:41:12Z-
dc.date.available2017-03-29T02:41:12Z-
dc.date.issued2015-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=657600&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/221940-
dc.description학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2015.2 ,[iv, 28 p. :]-
dc.description.abstracthowever, the hypervisor itself has software vulnerabilities and performance overhead. Hardware-based monitors overcome the limitation by isolation from their host system. Nonetheless, a recent study introduced ATRA attack that relocate kernel objects and the related page table data structures to non-monitoring memory region in order to bypass existing hardware-based monitors. In this paper, we present AA Monitor (Anti-ATRA Monitor) that is an extension of Vigilare system to defend against ATRA. We modified the host processor to extract a CPU register value, which plays role in root pointer of page table structures. We show its effectiveness by implementing the AA Monitor prototype. Address Mapping Verifier in AA Monitor verifies the correctness of the value by walking page tables with the register value. The verifier compares the physical address from the result of the page table walking with the calculated physical address from previously stored kernel objects` virtual addresses. Also, PTBR Value Cache maintains the register values to avoid unnecessary verification. We evaluated our solution with STREAM Bench and observed 0.14% of the performance overhead in the host system, which is negligible.-
dc.description.abstractkernel rootkits that modifies its operating system kernel become the real threat. To defend against them, several hypervisor-based and hardware-based monitors have been introduced. Hypervisor-based monitors use hypervisor as a root-of-trust-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectHardware-based monitor-
dc.subjectATRA-
dc.subjectkernel integrity-
dc.subjectrootkit-
dc.subject하드웨어 모니터-
dc.subject주소 변환 재비치 공격-
dc.subject커널 무결성-
dc.subject루트킷-
dc.titleAA monitor-
dc.title.alternativeAA 모니터 : 주소 변환 재배치 공격에 대한 효과적인 방어-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0