A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
A Snoop-Based Kernel Introspection System against Address Translation Redirection Attack
메모리 주소 변환 공격을 탐지하기 위한 Snoop기반의 커널 검사 시스템
2016
Journal of the Korea Institute of Information Security and Cryptology
메모리 주소 변환 공격을 탐지하기 위한 Snoop기반의 커널 검사 시스템
A TrustZone-based rootkit detecting solution using a secure timer ensures the integrity of monitoring system, because ARM TrustZone technology provides isolated environments from a monitored OS against intercepting and modifying invoke commands. However, it is vulnerable to transient attack due to periodic monitoring. Also, Address Translation Redirection Attack (ATRA) cannot be detected, because the monitoring is operated by using the physical address of memory. To ameliorate this problem, we
doi:10.13089/jkiisc.2016.26.5.1151
fatcat:3xjtyv2zszfmfontlh4soakdrq