Write-protection enforcement

Autor: Igor Stoppa, Ahmed Abdelraoof, Mohamed Azab
Rok vydání: 2020
Předmět:
Zdroj: SAC
DOI: 10.1145/3341105.3373919
Popis: A rootkit is a piece of code that aims to manipulate the computer behaviour without being detected. Rootkits are mainly used to disable kernel self-protection, hide malware presence, provide a covert communication channel between malware and their Command and Control server (C&C), secretly maintain a breach viable. Depending on how rootkits are injected into the target, they can either reside in user or kernel space. Kernel space rootkits are the hardest to detect and prevent because they usually take control of the kernel once compromised. In this paper, we present WpE, Write-protection Enforcement: a hypervisor-backed kernel hardening system. WpE aims to preserve the kernel self-protection active in presence of attacks. WpE is comprised of two software components, one running in hypervisor mode and one running in kernel mode. At OS instantiation, the kernel component will arrange the kernel critical data in a way that facilitate labeling such data as either writable, rarely writable, or read only. The hypervisor component will stop a compromised kernel from altering memory or registers that were flagged for read only protection. In the current stage of implementation, we managed to successfully integrate WpE with KVM and Linux kernel. Evaluation showed that WpE adds acceptable overhead.
Databáze: OpenAIRE