JISE


  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22]


Journal of Information Science and Engineering, Vol. 31 No. 2, pp. 455-473


MrKIP: Rootkit Recognition With Kernel Function Invocation Pattern


CHI-WEI WANG, CHONG-KUAN CHEN, CHIA-WEI WANG AND SHIUHPYNG WINSTON SHIEH

Network Security Laboratory of Department of Computer Science
National Chiao Tung University
Hsinchu, 300 Taiwan
E-mail: {cwwangabc; glacier314}@gmail.com; {ckchen; ssp}@cs.nctu.edu.tw 

 


    Existing mechanisms tracing user-level activities such as system calls and APIs can be circumvented by the kernel-level rootkits. In this paper, a novel system, MrKIP, is proposed to recognize rootkits based on their kernel-level activities. Our scheme semiautomatically generates suitable locations for analysts to implement checkpoints, which are used to profile kernel-space activities. Then, collected rootkits are executed in an emulator with these checkpoints for behavior profiling. The collected behaviors are clustered and used for model construction. The constructed model can be used to recognize new variants of rootkit families. Our scheme differs from conventional tracers due to its ability to cover kernel-space malware and the whole-system scope. In addition, monitoring at the kernel level raises high barrier for malware to evade, since all tasks are eventually executed through the basic kernel functions.


Keywords: rootkit recognition, malware analysis, virtual machine introspection, data mining, dynamic analysis

  Retrieve PDF document (JISE_201502_06.pdf)