MOSKG: Countering kernel rootkits with a secure paging mechanism

Guanglu Yan, Senlin Luo, Fan Feng, Limin Pan*, Qamas Gul Khan Safi

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

The kernel-level rootkits compromise the security of operating systems. In the current research studies, virtualization is used as a key tool against these attacks with virtualization-based memory protection. There are glitches in the memory protection mechanism, and it is vulnerable to page mapping attack and hard to be used for protecting dynamic data. To address these problems, we proposed a secure paging mechanism and constructed an external and transparent architecture named multiple operating systems kernel guard (MOSKG), which can protect critical kernel data in different operating systems like Windows and Linux, both of 32-bit and 64-bit. To evaluate our proposed architecture, we applied some experiments that are based on the study of kernel rootkits. The results show that MOSKG can protect critical kernel data from dynamic kernel object manipulation and page mapping attack, and it defeats all of the kernel-level attacks. It is also a significant conclusion that MOSKG only introduces a small performance overhead of 2.3%.

Original languageEnglish
Pages (from-to)3580-3591
Number of pages12
JournalSecurity and Communication Networks
Volume8
Issue number18
DOIs
Publication statusPublished - 1 Dec 2015

Keywords

  • Kernel integrity
  • Kernel-level attacks
  • Memory protection
  • Rootkit
  • Virtualization

Fingerprint

Dive into the research topics of 'MOSKG: Countering kernel rootkits with a secure paging mechanism'. Together they form a unique fingerprint.

Cite this