Title
Tracking rootkit footprints with a practical memory analysis system
Abstract
In this paper, we present MAS, a practical memory analysis system for identifying a kernel rootkit's memory footprint in an infected system. We also present two large-scale studies of applying MAS to 848 real-world Windows kernel crash dumps and 154,768 potential malware samples. Error propagation and invalid pointers are two key challenges that stop previous pointer-based memory traversal solutions from effectively and efficiently analyzing real-world systems. MAS uses a new memory traversal algorithm to support error correction and stop error propagation. Our enhanced static analysis allows the MAS memory traversal to avoid error-prone operations and provides it with a reliable partial type assignment. Our experiments show that MAS was able to analyze all memory snapshots quickly with typical running times between 30 and 160 seconds per snapshot and with near perfect accuracy. Our kernel malware study observes that the malware samples we tested hooked 191 different function pointers in 31 different data structures. With MAS, we were able to determine quickly that 95 out of the 848 crash dumps contained kernel rootkits.
Year
Venue
Keywords
2012
USENIX Security Symposium
memory snapshot,new memory traversal algorithm,kernel rootkit,rootkit footprint,practical memory analysis system,memory footprint,mas memory traversal,previous pointer-based memory traversal,error propagation,kernel rootkits,kernel malware study,sampling error,error correction,data structure,static analysis
Field
DocType
Citations 
Pointer (computer programming),Data structure,Function pointer,Tree traversal,Computer science,Computer security,Rootkit,Real-time computing,Malware,Memory footprint,Snapshot (computer storage)
Conference
7
PageRank 
References 
Authors
0.49
14
4
Name
Order
Citations
PageRank
Weidong Cui1118056.04
Marcus Peinado2136078.38
Zhilei Xu318710.42
Ellick Chan41289.47