skip to main content
10.1145/3196494.3201582acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
poster

POSTER: Undetectable Task Bypassing OS Scheduler via Hardware Task Switching

Published:29 May 2018Publication History

ABSTRACT

Recently, malicious mining using CPUs has become a trend - mining which the task is not detected by the users is even more of a threat. In this paper, we focused on discovering a new IA-32\footnoteIt stands for Intel Architecture-32bit. It is the 32-bit version of the x86 instruction set architecture which supports 32-bit computing. vulnerability and found an undetectable task using hardware task switching method. The created task is undetectable by the operating system and thus hidden from the system user. Although hardware task switching methods are replaced by more convenient software switching methods in the recent years, they still exist on modern computer systems. By manually manipulating hardware task switching, which is directly managed by the CPU, we show that it is possible to create a hidden scheduler aside from the ones created by the operating system. We demonstrate using a simple CPU consumption example that these hidden tasks have potential to evolve into more sophisticated malicious attacks that can go unnoticed by users.

References

  1. Z. Bazrafshan, H.Hashemi, S. M. H. Fard, and A.Hamzeh . 2013. A survey on heuristic malware detectiontechniques The 5th Conference on Informationand Knowledge Technology. 113--120.Google ScholarGoogle Scholar
  2. J. Butler. 2004. DKOM (Direct Kernel Object Manipulation). (2004). deftempurl%http://www.blackhat.com/presentations/win-usa-04/ bh-win-04-butler.pdf. tempurlGoogle ScholarGoogle Scholar
  3. J. M. De Goyeneche andE. A. F. De Sousa . 1999. Loadable kernel modules. IEEE Software Vol. 16, 1 (Jan . 1999), bibinfopages65--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jamie Butler Sherri Sparks. 2005. SHADOW WALKER Raising The Bar For Rootkit Detection. (2005). deftempurl%http://www.blackhat.com/presentations/bh-jp-05/bh-jp-05-sparks-butler.pdf. tempurlGoogle ScholarGoogle Scholar
  5. John Harrison Spencer Smith. 2012. Rootkits. (2012). deftempurl%https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/rootkits-12-en.pdf. tempurlGoogle ScholarGoogle Scholar
  6. F. Zhou, M. Goel,P. Desnoyers, and R. Sundaram. 2011. Scheduler Vulnerabilities and Coordinated Attacksin Cloud Computing 2011 IEEE 10thInternational Symposium on Network Computing and Applications. bibinfopages123--130. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. POSTER: Undetectable Task Bypassing OS Scheduler via Hardware Task Switching

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications Security
      May 2018
      866 pages
      ISBN:9781450355766
      DOI:10.1145/3196494

      Copyright © 2018 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 May 2018

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      ASIACCS '18 Paper Acceptance Rate52of310submissions,17%Overall Acceptance Rate418of2,322submissions,18%
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader