Loading [MathJax]/extensions/MathMenu.js
Cloaker: Hardware Supported Rootkit Concealment | IEEE Conference Publication | IEEE Xplore

Cloaker: Hardware Supported Rootkit Concealment


Abstract:

Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a conse...Show More

Abstract:

Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of the ongoing struggle between attackers and system defenders. In order to explore the next step in rootkit evolution and to build strong defenses, we look at this issue from the point of view of an attacker. We construct Cloaker, a proof-of-concept rootkit for the ARM platform that is non- persistent and only relies on hardware state modifications for concealment and operation. A primary goal in the design of Cloaker is to not alter any part of the host operating system (OS) code or data, thereby achieving immunity to all existing rootkit detection techniques which perform integrity, behavior and signature checks of the host OS. Cloaker also demonstrates that a self-contained execution environment for malicious code can be provided without relying on the host OS for any services. Integrity checks of hardware state in each of the machine's devices are required in order to detect rootkits such as Cloaker. We present a framework for the Linux kernel that incorporates integrity checks of hardware state performed by device drivers in order to counter the threat posed by rootkits such as Cloaker.
Date of Conference: 18-22 May 2008
Date Added to IEEE Xplore: 28 May 2008
Print ISBN:978-0-7695-3168-7

ISSN Information:

Conference Location: Oakland, CA, USA

Contact IEEE to Subscribe

References

References is not available for this document.