作者: Chi-Wei Wang , Shiuhpyng Winston Shieh , Chong Kuan Chen , Chia-Wei Wang
关键词:
摘要: Existing mechanisms tracing user-level activities such as system calls and APIs can be circumvented by the kernel-level rootkits. In this paper, a novel system, MrKIP, is proposed to recognize rootkits based on their activities. Our scheme semiautomatically generates suitable locations for analysts implement checkpoints, which are used profile kernel-space Then, collected executed in an emulator with these checkpoints behavior profiling. The behaviors clustered model construction. constructed new variants of rootkit families. differs from conventional tracers due its ability cover malware whole-system scope. addition, monitoring at kernel level raises high barrier evade, since all tasks eventually through basic functions.