Identifying Systemic Threats to Kernel Data: Attacks and Defense Techniques

Identifying Systemic Threats to Kernel Data: Attacks and Defense Techniques

Arati Baliga, Pandurang Kamat, Vinod Ganapathy, Liviu Iftode
ISBN13: 9781605668505|ISBN10: 1605668508|ISBN13 Softcover: 9781616923839|EISBN13: 9781605668512
DOI: 10.4018/978-1-60566-850-5.ch003
Cite Chapter Cite Chapter

MLA

Baliga, Arati, et al. "Identifying Systemic Threats to Kernel Data: Attacks and Defense Techniques." Advanced Operating Systems and Kernel Applications: Techniques and Technologies, edited by Yair Wiseman and Song Jiang, IGI Global, 2010, pp. 46-70. https://doi.org/10.4018/978-1-60566-850-5.ch003

APA

Baliga, A., Kamat, P., Ganapathy, V., & Iftode, L. (2010). Identifying Systemic Threats to Kernel Data: Attacks and Defense Techniques. In Y. Wiseman & S. Jiang (Eds.), Advanced Operating Systems and Kernel Applications: Techniques and Technologies (pp. 46-70). IGI Global. https://doi.org/10.4018/978-1-60566-850-5.ch003

Chicago

Baliga, Arati, et al. "Identifying Systemic Threats to Kernel Data: Attacks and Defense Techniques." In Advanced Operating Systems and Kernel Applications: Techniques and Technologies, edited by Yair Wiseman and Song Jiang, 46-70. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-850-5.ch003

Export Reference

Mendeley
Favorite

Abstract

The authors demonstrate a new class of attacks and also present a novel automated technique to detect them. The attacks do not explicitly exhibit hiding behavior but are stealthy by design. They do not rely on user space programs to provide malicious functionality but achieve the same by simply manipulating kernel data. These attacks are symbolic of a larger systemic problem within the kernel, thus requiring comprehensive analysis. The author’s novel rootkit detection technique based on automatic inference of data structure invariants, which can automatically detect such advanced stealth attacks on the kernel.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.