Title
Subverting Operating System Properties Through Evolutionary DKOM Attacks.
Abstract
Modern rootkits have moved their focus on the exploitation of dynamic memory structures, which allows them to tamper with the behavior of the system without modifying or injecting any additional code. In this paper we discuss a new class of Direct Kernel Object Manipulation DKOM attacks that we call Evolutionary DKOM E-DKOM. The goal of this attack is to alter the way some data structures \"evolve\" over time. As case study, we designed and implemented an instance of Evolutionary DKOM attack that targets the OS scheduler for both userspace programs and kernel threads. Moreover, we discuss the implementation of a hypervisor-based data protection system that mimics the behavior of an OS component in our case the scheduling system and detect any unauthorized modification. We finally discuss the challenges related to the design of a general detection system for this class of attacks.
Year
DOI
Venue
2016
10.1007/978-3-319-40667-1_1
DIMVA
Field
DocType
Citations 
Kernel (linear algebra),Data structure,Direct kernel object manipulation,Computer science,Computer security,Rootkit,Hypervisor,Thread (computing),Scheduling system,Data Protection Act 1998,Operating system
Conference
5
PageRank 
References 
Authors
0.47
31
4
Name
Order
Citations
PageRank
Mariano Graziano1405.30
Lorenzo Flore250.47
Andrea Lanzi384540.99
Davide Balzarotti42040113.64