DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Hojoon | ko |
dc.contributor.author | Moon, Hyungon | ko |
dc.contributor.author | Heo, Ingoo | ko |
dc.contributor.author | Jang, Daehee | ko |
dc.contributor.author | Jang, Jinsoo | ko |
dc.contributor.author | Kim, Kihwan | ko |
dc.contributor.author | Paek, Yunheung | ko |
dc.contributor.author | Kang, Brent Byunghoon | ko |
dc.date.accessioned | 2019-11-19T06:20:06Z | - |
dc.date.available | 2019-11-19T06:20:06Z | - |
dc.date.created | 2017-06-28 | - |
dc.date.created | 2017-06-28 | - |
dc.date.created | 2017-06-28 | - |
dc.date.issued | 2019-03 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.16, no.2, pp.287 - 300 | - |
dc.identifier.issn | 1545-5971 | - |
dc.identifier.uri | http://hdl.handle.net/10203/268480 | - |
dc.description.abstract | External hardware-based kernel integrity monitors have been proposed to mitigate kernel-level malwares. However, the existing external approaches have been limited to monitoring the static regions of kernel while the latest rootkits manipulate the dynamic kernel objects. To address the issue, we present KI-Mon, a hardware-based platform that introduces eventtriggered monitoring techniques for kernel dynamic objects. KIMon advances the bus traffic snooping technique to not only detect memory write traffic on the host bus but also filter out all but meaningful traffic to generate events. We show how kernel invariant verification software can be developed around these events, and also provide a set of APIs for additional invariant verification development. We also report our findings and considerations on the unique challenges for external monitors – such as cache coherency, dynamic object tracing. We introduce host-side kernel changes that alleviate these issues that involve changes in kernel’s object allocation and cache policy control. We have built a prototype of KI-Mon on the ARM architecture to demonstrate the efficacy of KI-Mon’s event-triggered mechanism in terms of performance overhead for the monitored host system and the processor usage of the KI-Mon processor. | - |
dc.language | English | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object | - |
dc.type | Article | - |
dc.identifier.wosid | 000461357500008 | - |
dc.identifier.scopusid | 2-s2.0-85062980304 | - |
dc.type.rims | ART | - |
dc.citation.volume | 16 | - |
dc.citation.issue | 2 | - |
dc.citation.beginningpage | 287 | - |
dc.citation.endingpage | 300 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
dc.identifier.doi | 10.1109/TDSC.2017.2679710 | - |
dc.contributor.localauthor | Kang, Brent Byunghoon | - |
dc.contributor.nonIdAuthor | Moon, Hyungon | - |
dc.contributor.nonIdAuthor | Heo, Ingoo | - |
dc.contributor.nonIdAuthor | Paek, Yunheung | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Kernel security | - |
dc.subject.keywordAuthor | rootkit detection | - |
dc.subject.keywordAuthor | kernel integrity monitors | - |
dc.subject.keywordAuthor | hardware-based kernel monitoring | - |
dc.subject.keywordPlus | ARCHITECTURE | - |
dc.subject.keywordPlus | ROOTKITS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.