skip to main content
10.1145/3458903.3458909acmotherconferencesArticle/Chapter ViewAbstractPublication PageshaspConference Proceedingsconference-collections
research-article
Open Access

Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks

Published:23 October 2021Publication History

ABSTRACT

Rootkits are malware that attempt to compromise the system’s functionalities while hiding their existence. Various rootkits have been proposed as well as different software defenses, but only very few hardware defenses. We position hardware-enhanced rootkit defenses as an interesting research opportunity for computer architects, especially as many new hardware defenses for speculative execution attacks are being actively considered. We first describe different techniques used by rootkits and their prime targets in the operating system. We then try to shed insights on what the main challenges are in providing a rootkit defense, and how these may be overcome. We show how a hypervisor-based defense can be implemented, and provide a full prototype implementation in an open-source cloud computing platform, OpenStack. We evaluate the performance overhead of different defense mechanisms. Finally, we point to some research opportunities for enhancing resilience to rootkit-like attacks in the hardware architecture.

References

  1. [n.d.]. Amazon Inspector. https://aws.amazon.com/inspector/.Google ScholarGoogle Scholar
  2. [n.d.]. ARM926EJ-S Technical Reference Manual: Control Register c1. https://developer.arm.com/documentation/ddi0198/e/programmer-s-model/register-descriptions/control-register-c1.Google ScholarGoogle Scholar
  3. [n.d.]. Common Vulnerabilities and Exposures. https://cve.mitre.org/.Google ScholarGoogle Scholar
  4. [n.d.]. Explorations with adore-ng. http://ab-rtfm.blogspot.com/2007/07/explorations-with-adore-ng.html.Google ScholarGoogle Scholar
  5. [n.d.]. The httperf HTTP load generator. https://github.com/httperf/httperf.Google ScholarGoogle Scholar
  6. [n.d.]. Klister - Windows Kernel Level Rootkit Detector. https://securiteam.com/tools/5gp0315ffw/.Google ScholarGoogle Scholar
  7. [n.d.]. Libbdvmi. https://github.com/razvan-cojocaru/libbdvmi.Google ScholarGoogle Scholar
  8. [n.d.]. LibVMI.Google ScholarGoogle Scholar
  9. [n.d.]. Linux Hook IDT. https://github.com/majdi/deadlands/tree/master/srcs/linux/module/HOOK/IDT.Google ScholarGoogle Scholar
  10. [n.d.]. Magento Commerce. http://www.magento.com/.Google ScholarGoogle Scholar
  11. [n.d.]. Microsoft Antimalware for Azure Cloud Services and Virtual Machines. https://docs.microsoft.com/en-us/azure/security/azure-security-antimalware.Google ScholarGoogle Scholar
  12. [n.d.]. xingyiquan - simple linux kernel rootkit for kernel 3.x and kernel 2.6.x. https://sw0rdm4n.wordpress.com/2014/11/03/xingyiquan-simple-linux-kernel-rootkit-for-kernel-3-x-and-kernel-2-6-x/.Google ScholarGoogle Scholar
  13. Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, and Sergio Loureiro. 2012. A Security Analysis of Amazon’s Elastic Compute Cloud Service. In ACM Symposium on Applied Computing.Google ScholarGoogle Scholar
  14. Andrew Baumann, Marcus Peinado, and Galen Hunt. 2015. Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems (TOCS) 33, 3 (2015), 1–26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Bitdefender. [n.d.]. Hypervisor Introspection. http://www.bitdefender.com/business/hypervisor-introspection.html.Google ScholarGoogle Scholar
  16. Jamie Butler and Peter Silberman. 2006. Raide: Rootkit analysis identification elimination. Black Hat USA 47(2006).Google ScholarGoogle Scholar
  17. Martim Carbone, Matthew Conover, Bruce Montague, and Wenke Lee. 2012. Secure and Robust Monitoring of Virtual Machines Through Guest-assisted Introspection. In Intl. Conf. on Research in Attacks, Intrusions, and Defenses.Google ScholarGoogle Scholar
  18. Silvio Cesare. [n.d.]. Syscall Redirection Without Modifying the Syscall Table. http://www.ouah.org/stealth-syscall.txt.Google ScholarGoogle Scholar
  19. Ping Chen, Xiao Xing, Bing Mao, and Li Xie. 2010. Return-Oriented Rootkit without Returns (on the x86). In Information and Communications Security, Miguel Soriano, Sihan Qing, and Javier López(Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 340–354.Google ScholarGoogle Scholar
  20. Bryce Cogswell and Mark Russinovich. 2006. Rootkitrevealer v1. 71. Rootkit detection tool by Microsoft(2006).Google ScholarGoogle Scholar
  21. F. M. David, E. M. Chan, J. C. Carlyle, and R. H. Campbell. 2008. Cloaker: Hardware Supported Rootkit Concealment. In 2008 IEEE Symposium on Security and Privacy (sp 2008). 296–310.Google ScholarGoogle Scholar
  22. Artem Dinaburg, Paul Royal, Monirul Sharif, and Wenke Lee. 2008. Ether: Malware Analysis via Hardware Virtualization Extensions. In ACM Conf. on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Brendan Dolan-Gavitt, Tim Leek, Michael Zhivich, Jonathon Giffin, and Wenke Lee. 2011. Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. In IEEE Symp. on Security and Privacy.Google ScholarGoogle Scholar
  24. Yangchun Fu and Zhiqiang Lin. 2012. Space Traveling Across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. In IEEE Symp. on Security and Privacy.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Tal Garfinkel and Mendel Rosenblum. 2003. A Virtual Machine Introspection Based Architecture for Intrusion Detection.. In Network and Distribution Security Symposium.Google ScholarGoogle Scholar
  26. Ralf Hund, Thorsten Holz, and Felix C Freiling. 2009. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In USENIX security symposium. 383–398.Google ScholarGoogle Scholar
  27. Xuxian Jiang, Xinyuan Wang, and Dongyan Xu. 2007. Stealthy Malware Detection Through Vmm-based ”Out-of-the-box” Semantic View Reconstruction. In ACM Conf. on Computer and Communications Security.Google ScholarGoogle Scholar
  28. Stephen T. Jones, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. 2008. VMM-based Hidden Process Detection and Identification Using Lycosid. In ACM International Conference on Virtual Execution Environments.Google ScholarGoogle Scholar
  29. Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen Wang, and Jay Lorch. 2006. SubVirt: Implementing malware with virtual machines. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (proceedings of the 2006 ieee symposium on security and privacy ed.). Institute of Electrical and Electronics Engineers, Inc., 314–327. https://www.microsoft.com/en-us/research/publication/subvirt-implementing-malware-with-virtual-machines/Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, 2019. Spectre attacks: Exploiting speculative execution. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1–19.Google ScholarGoogle ScholarCross RefCross Ref
  31. Tamas K. Lengyel, Steve Maresca, Bryan D. Payne, George D. Webster, Sebastian Vogl, and Aggelos Kiayias. 2014. Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System. In Annual Computer Security Applications Conference.Google ScholarGoogle Scholar
  32. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 973–990. https://www.usenix.org/conference/usenixsecurity18/presentation/lippGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  33. Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday Savagaonkar. 2013. Innovative Instructions and Software Model for Isolated Execution. In Proceedings of the ACM International Workshop on Hardware and Architectural Support for Security and Privacy.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. B. D. Payne, M. Carbone, and W. Lee. 2007. Secure and Flexible Monitoring of Virtual Machines. In Annual Computer Security Applications Conference.Google ScholarGoogle Scholar
  35. B. D. Payne, M. Carbone, M. Sharif, and W. Lee. 2008. Lares: An Architecture for Secure Active Monitoring Using Virtualization. In IEEE Symp. on Security and Privacy.Google ScholarGoogle Scholar
  36. Diego Perez-Botero, Jakub Szefer, and Ruby B. Lee. 2013. Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers. In International Workshop on Security in Cloud Computing.Google ScholarGoogle Scholar
  37. Nick L Petroni Jr, Timothy Fraser, Jesus Molina, and William A Arbaugh. 2004. Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor.. In USENIX security symposium. San Diego, USA, 179–194.Google ScholarGoogle Scholar
  38. Niels Provos, Markus Friedl, and Peter Honeyman. 2003. Preventing Privilege Escalation.. In USENIX Security Symposium.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Nguyen Anh Quynh and Yoshiyasu Takefuji. 2007. Towards a Tamper-resistant Kernel Rootkit Detector. In ACM Symposium on Applied Computing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Joanna Rutkowska. 2006. Introducing blue pill. The official blog of the invisiblethings. org 22 (2006), 23.Google ScholarGoogle Scholar
  41. Joanna Rutkowska. 2007. Beyond the CPU: Defeating hardware based RAM acquisition. Proceedings of BlackHat DC 2007 (2007).Google ScholarGoogle Scholar
  42. Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, and Iliano Cervesato. 2017. On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security(Abu Dhabi, United Arab Emirates) (ASIA CCS ’17). Association for Computing Machinery, New York, NY, USA, 483–493. https://doi.org/10.1145/3052973.3052999Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Sherri Sparks and Jamie Butler. 2005. Shadow walker: Raising the bar for rootkit detection. Black Hat Japan 11, 63 (2005), 504–533.Google ScholarGoogle Scholar
  44. Deepa Srinivasan, Zhi Wang, Xuxian Jiang, and Dongyan Xu. 2011. Process Out-grafting: An Efficient ”out-of-VM” Approach for Fine-grained Process Execution Monitoring. In ACM Conf. on Computer and Communications Security.Google ScholarGoogle Scholar
  45. Chia-Che Tsai, Donald E Porter, and Mona Vij. 2017. Graphene-sgx: A practical library {OS} for unmodified applications on {SGX}. In 2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17). 645–658.Google ScholarGoogle Scholar
  46. V. R. Vasisht and H. S. Lee. 2008. SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. In 2008 41st IEEE/ACM International Symposium on Microarchitecture. 106–116.Google ScholarGoogle ScholarCross RefCross Ref
  47. X. Wang and R. Karri. 2013. NumChecker: Detecting kernel control-flow modifying rootkits by using Hardware Performance Counters. In 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC). 1–7.Google ScholarGoogle Scholar
  48. Su Zhang, Xinwen Zhang, and Xinming Ou. 2014. After We Knew It: Empirical Study and Modeling of Cost-effectiveness of Exploiting Prevalent Known Vulnerabilities Across IaaS Cloud. In ACM Symposium on Information, Computer and Communications Security.Google ScholarGoogle Scholar

Index Terms

  1. Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            HASP '20: Proceedings of the 9th International Workshop on Hardware and Architectural Support for Security and Privacy
            October 2020
            71 pages
            ISBN:9781450388986
            DOI:10.1145/3458903

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 23 October 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate9of13submissions,69%
          • Article Metrics

            • Downloads (Last 12 months)161
            • Downloads (Last 6 weeks)11

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format