Data-Centric OS Kernel Malware Characterization

IEEE Transactions on Information Forensics and Security(2014)

引用 35|浏览129
暂无评分
摘要
Traditional malware detection and analysis approaches have been focusing on code-centric aspects of malicious programs, such as detection of the injection of malicious code or matching malicious code sequences. However, modern malware has been employing advanced strategies, such as reusing legitimate code or obfuscating malware code to circumvent the detection. As a new perspective to complement code-centric approaches, we propose a data-centric OS kernel malware characterization architecture that detects and characterizes malware attacks based on the properties of data objects manipulated during the attacks. This framework consists of two system components with novel features: First, a runtime kernel object mapping system which has an un-tampered view of kernel data objects resistant to manipulation by malware. This view is effective at detecting a class of malware that hides dynamic data objects. Second, this framework consists of a new kernel malware detection approach that generates malware signatures based on the data access patterns specific to malware attacks. This approach has an extended coverage that detects not only the malware with the signatures, but also the malware variants that share the attack patterns by modeling the low level data access behaviors as signatures. Our experiments against a variety of real-world kernel rootkits demonstrate the effectiveness of data-centric malware signatures.
更多
查看译文
关键词
invasive software,malware attack characterization,runtime kernel object mapping system,virtual machine monitor,code-centric approach,os kernel malware characterization,real-world kernel rootkits,operating system kernels,data encapsulation,dynamic data object hiding,attack patterns,data-centric malware analysis,digital signatures,data object manipulation,malware signatures,low level data access behavior modeling,data access patterns,data-centric os kernel malware characterization architecture,dynamic scheduling,malware,resource management,data structures,kernel
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要