Back to Search Start Over

Drootkit: Kernel-Level Rootkit Detection and Recovery Based on eBPF.

Authors :
hu, Xingyu
Huang, Ming
Xue, Youhua
Jiang, Lifeng
Liu, Yao
Xie, Guoqi
Source :
Journal of Circuits, Systems & Computers. 3/15/2024, Vol. 33 Issue 4, p1-18. 18p.
Publication Year :
2024

Abstract

The concealment of rootkits makes them a significant security threat. Kernel-level rootkits can be extremely dangerous as they have high system privileges. A typical type of kernel-level rootkits is to hook system calls which are essential for overall system functionality. This paper presents drootkit, a tool to detect kernel-level rootkits that hook system calls. Additionally, drootkit can recover damaged systems. This tool utilizes eBPF technology, ensuring both flexibility and security. When installing new kernel modules, the virtual address range of the initial kernel code will not be affected. In light of this, drootkit conducts bounds checking on all system calls within the system. In the case of system calls being hooked, drootkit can detect and recover them while issuing warning messages. For testing purposes, this paper also implements a malicious kernel module that can hook system calls and run on the arm64 platform. We have conducted an experiment that confirms drootkit's capability to detect rootkits while also effectively restoring the system. Moreover, drootkit has very low system overhead and does not significantly affect system performance, making it a reliable choice for a backend program that can run for an extended period of time. [ABSTRACT FROM AUTHOR]

Subjects

Subjects :
*HOOKS

Details

Language :
English
ISSN :
02181266
Volume :
33
Issue :
4
Database :
Academic Search Index
Journal :
Journal of Circuits, Systems & Computers
Publication Type :
Academic Journal
Accession number :
176107756
Full Text :
https://doi.org/10.1142/S0218126624500737