A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
HACS: A Hypervisor-Based Access Control Strategy to Protect Security-Critical Kernel Data
2017
DEStech Transactions on Computer Science and Engineering
Rootkits are prevalent in today's Internet. Using virtual machine monitor (VMM) is an attractive way to deal with rootkits. However, most of the previous studies do not focus on protecting kernel data using VMMs, especially for the data that may be dynamically changed. Direct kernel object manipulation (DKOM) attacks can stealthily detach kernel data objects belonging to the malicious program from kernel's normal list, or overwrite import fields in the kernel. It's hard for OSes or VMMs to
doi:10.12783/dtcse/cst2017/12516
fatcat:iv2sgyml2bemtaaf5bkubyv67y