There are no files associated with this item.
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.citation.endPage | 157 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 145 | - |
dc.citation.title | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
dc.citation.volume | 14 | - |
dc.contributor.author | Moon, Hyungon | - |
dc.contributor.author | Lee, Hojoon | - |
dc.contributor.author | Heo, Ingoo | - |
dc.contributor.author | Kim, Kihwan | - |
dc.contributor.author | Paek, Yunheung | - |
dc.contributor.author | Kang, Brent Byunghoon | - |
dc.date.accessioned | 2023-12-21T22:37:12Z | - |
dc.date.available | 2023-12-21T22:37:12Z | - |
dc.date.created | 2018-08-14 | - |
dc.date.issued | 2017-03 | - |
dc.description.abstract | To protect the integrity of operating system kernels, we present Vigilare system, a kernel integrity monitor that is architected to snoop the bus traffic of the host system from a separate independent hardware. This snoop-based monitoringenabled by the Vigilare system, overcomes the limitations of the snapshot-based monitoring employed in previous kernel integrity monitoring solutions. Being based on inspecting snapshots collected over a certain interval, the previous hardware-based monitoring solutions cannot detect transient attacks that can occur in between snapshots, and cannot protect the kernel against permanent damage. We implemented three prototypes of the Vigilare system by adding Snooper hardware connections module to the host system for bus snooping, and a snapshot-based monitor to be comared with, in order to evaluate the benefit of snoop-based monitoring. The prototypes of Vigilare system detected all the transient attacks and the second one protected the kernel with negligible performance degradation while the snapshot-based monitor could not detect all the attacks and induced considerable performance degradation as much as 10 percent in our tuned STREAM benchmark test. | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.14, no.2, pp.145 - 157 | - |
dc.identifier.doi | 10.1109/TDSC.2015.2443803 | - |
dc.identifier.issn | 1545-5971 | - |
dc.identifier.scopusid | 2-s2.0-85021748519 | - |
dc.identifier.uri | https://scholarworks.unist.ac.kr/handle/201301/24552 | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/7120934/ | - |
dc.identifier.wosid | 000396397200003 | - |
dc.language | 영어 | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping | - |
dc.type | Article | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Tel : 052-217-1404 / Email : scholarworks@unist.ac.kr
Copyright (c) 2023 by UNIST LIBRARY. All rights reserved.
ScholarWorks@UNIST was established as an OAK Project for the National Library of Korea.