OPKH:轻量级在线保护内核模块中内核钩子的方法(英文)

被引:1
作者
田东海 [1 ,2 ]
李轩涯 [3 ]
胡昌振 [1 ]
闫怀志 [1 ]
机构
[1] Beijing Key Laboratory of Software Security Engineering Technique,School of Software, Beijing Institute of Technology
[2] State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences
[3] National Engineering Laboratory for Information Security Technologies,Institute of Information Engineering, Chinese Academy of
关键词
kernel hook; virtualization technology; online patching;
D O I
暂无
中图分类号
TP316 [操作系统];
学科分类号
摘要
Kernel hooks are very important control data in OS kernel.Once these data are compromised by attackers,they can change the control flow of OS kernel’s execution.Previous solutions suffer from limitations in that:1)some methods require modifying the source code of OS kernel and kernel modules,which is less practical for wide deployment;2)other methods cannot well protect the kernel hooks and function return addresses inside kernel modules whose memory locations cannot be predetermined.To address these problems,we propose OPKH,an on-the-fly hook protection system based on the virtualization technology.Compared with previous solutions,OPKH offers the protected OS a fully transparent environment and an easy deployment.In general,the working procedure of OPKH can be divided into two steps.First,we utilise the memory virtualization for offline profiling so that the dynamic hooks can be identified.Second,we exploit the online patching technique to instrument the hooks for run-time protection.The experiments show that our system can protect the dynamic hooks effectively with minimal performance overhead.
引用
收藏
页码:15 / 23
页数:9
相关论文
共 2 条
  • [1] 利用硬件调试特性检测内核异常hook的方法(英文)
    石文昌
    周洪伟
    原锦辉
    梁彬
    [J]. 中国通信, 2012, 9 (10) : 78 - 90
  • [2] Attacking the Core:Kernel Exploiting Notes .2 http://phrack.org/issues.html?issue=64&id=6 . 2013