Skip to main navigation Skip to search Skip to main content

Hello rootKitty: A lightweight invariance-enforcing framework

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

In monolithic operating systems, the kernel is the piece of code that executes with the highest privileges and has control over all the software running on a host. A successful attack against an operating system's kernel means a total and complete compromise of the running system. These attacks usually end with the installation of a rootkit, a stealthy piece of software running with kernel privileges. When a rootkit is present, no guarantees can be made about the correctness, privacy or isolation of the operating system. In this paper we present Hello rootKitty, an invariance-enforcing framework which takes advantage of current virtualization technology to protect a guest operating system against rootkits. Hello rootKitty uses the idea of invariance to detect maliciously modified kernel data structures and restore them to their original legitimate values. Our prototype has negligible performance and memory overhead while effectively protecting commodity operating systems from modern rootkits.

Original languageEnglish
Title of host publicationInformation Security - 14th International Conference, ISC 2011, Proceedings
Pages213-228
Number of pages16
DOIs
StatePublished - 2011
Event14th International Conference on Information Security, ISC 2011 - Xi'an, China
Duration: Oct 26 2011Oct 29 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7001 LNCS

Conference

Conference14th International Conference on Information Security, ISC 2011
Country/TerritoryChina
CityXi'an
Period10/26/1110/29/11

Keywords

  • detection
  • invariance
  • rootkits
  • virtualization

Fingerprint

Dive into the research topics of 'Hello rootKitty: A lightweight invariance-enforcing framework'. Together they form a unique fingerprint.

Cite this