Title :
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Author :
Baliga, Arati ; Ganapathy, Vinod ; Iftode, Liviu
Author_Institution :
Dept. of Comput. Sci., Rutgers Univ., NJ
Abstract :
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structures, such as the system call table and values of function pointers, recent work has demonstrated rootkits that maliciously modify non-control data. Prior techniques for rootkit detection fail to identify such rootkits either because they focus solely on detecting control data modifications or because they require elaborate, manually-supplied specifications to detect modifications of non-control data. This paper presents a novel rootkit detection technique that automatically detects rootkits that modify both control and non-control data. The key idea is to externally observe the execution of the kernel during a training period and hypothesize invariants on kernel data structures. These invariants are used as specifications of data structure integrity during an enforcement phase; violation of these invariants indicates the presence of a rootkit. We present the design and implementation of Gibraltar, a tool that uses the above approach to infer and enforce invariants. In our experiments, we found that Gibraltar can detect rootkits that modify both control and non-control data structures, and that its false positive rate and monitoring overheads are negligible.
Keywords :
data structures; inference mechanisms; operating system kernels; security of data; Gibraltar; automatic inference; kernel data structure invariant; kernel-level rootkit detection; system security; Application software; Automatic control; Computer science; Computer security; Condition monitoring; Control systems; Data security; Data structures; Degradation; Kernel; automatic; data structures; inference; invariants; kernel; non-control data; rootkits;
Conference_Titel :
Computer Security Applications Conference, 2008. ACSAC 2008. Annual
Conference_Location :
Anaheim, CA
Print_ISBN :
978-0-7695-3447-3
DOI :
10.1109/ACSAC.2008.29