Главная
Study mode:
on
1
Intro
2
Executive Summary
3
Kernel Rootkit Behavior Classification
4
Hardware Performance Counters (HPC)
5
Two-Phase Detection and identification
6
Syscall Measurement
7
Kernel Preemption Handling
8
Detection: Test Programs
9
Detection: Choosing Proper Events
10
Detection: Deviation Threshold
11
Detection: Kernel Rootkits Detected
12
Detection: Performance Evaluation
13
Identification: Kernel Rootkits Identified
14
Identification: Periodic Sampling
15
Security Analysis
16
Conclusion
Description:
Explore a comprehensive framework for detecting and identifying control-flow modifying kernel rootkits in virtual machines through this 53-minute Black Hat conference talk. Learn about NumChecker, a Virtual Machine Monitor (VMM) based system that leverages Hardware Performance Counters to measure low-level events during system call execution. Discover the two-phase detection and identification process, including syscall measurement, kernel preemption handling, and choosing proper events. Examine real-world kernel rootkit detection results, performance evaluations, and security analysis of this practical and effective approach implemented on Linux with Kernel-based Virtual Machine.

Numchecker - A System Approach for Kernel Rootkit Detection

Black Hat
Add to list