Nagy et al., 2021 - Google Patents
Rootkit detection on embedded IoT devicesNagy et al., 2021
View PDF- Document ID
 - 13021135594710587961
 - Author
 - Nagy R
 - Németh K
 - Papp D
 - Buttyán L
 - Publication year
 - Publication venue
 - Acta Cybernetica
 
External Links
Snippet
IoT systems are subject to cyber attacks, including infecting embedded IoT devices with  rootkits. Rootkits are malicious software that typically run with elevated privileges, which  makes their detection challenging. In this paper, we address this challenge: we propose a … 
    - 238000001514 detection method 0 title abstract description 76
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
 - G06F21/562—Static detection
 - G06F21/563—Static detection by source code analysis
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/577—Assessing vulnerabilities and evaluating computer system security
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
 - G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/575—Secure boot
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F9/00—Arrangements for programme control, e.g. control unit
 - G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
 - G06F9/44—Arrangements for executing specific programmes
 - G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/60—Protecting data
 - G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
 - G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F9/00—Arrangements for programme control, e.g. control unit
 - G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
 - G06F9/44—Arrangements for executing specific programmes
 - G06F9/445—Programme loading or initiating
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
 - G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
 - G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/2101—Auditing as a secondary aspect
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
 - G06F21/12—Protecting executable software
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 - G06F17/30067—File systems; File servers
 - G06F17/30129—Details of further file system functionalities
 - G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F12/00—Accessing, addressing or allocating within memory systems or architectures
 - G06F12/14—Protection against unauthorised use of memory or access to memory
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F8/00—Arrangements for software engineering
 - G06F8/60—Software deployment
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| US8661541B2 (en) | Detecting user-mode rootkits | |
| Dinaburg et al. | Ether: malware analysis via hardware virtualization extensions | |
| JP6370747B2 (en) | System and method for virtual machine monitor based anti-malware security | |
| Gu et al. | Process implanting: A new active introspection framework for virtualization | |
| Fattori et al. | Hypervisor-based malware protection with accessminer | |
| Nagy et al. | Rootkit detection on embedded IoT devices | |
| Jana et al. | TxBox: Building secure, efficient sandboxes with system transactions | |
| Javaheri et al. | A framework for recognition and confronting of obfuscated malwares based on memory dumping and filter drivers | |
| US11914711B2 (en) | Systems and methods for automatically generating malware countermeasures | |
| Xuan et al. | Toward revealing kernel malware behavior in virtual execution environments | |
| Nadim et al. | Characteristic features of the kernel-level rootkit for learning-based detection model training | |
| Cao et al. | Osiris: a malware behavior capturing system implemented at virtual machine monitor layer | |
| Mahapatra et al. | An online cross view difference and behavior based kernel rootkit detector | |
| Mankin et al. | Dione: a flexible disk monitoring and analysis framework | |
| Mankin | Classification of malware persistence mechanisms using low-artifact disk instrumentation | |
| Alton | Root kit discovery with behavior-based anomaly detection through eBPF | |
| Paul | Disk-level behavioral malware detection | |
| Flatley | Rootkit Detection Using a Cross-View Clean Boot Method | |
| Pereberina et al. | An approach to dynamic malware analysis based on system and application code split | |
| Segal et al. | UEFI Memory Forensics: A Framework for UEFI Threat Analysis | |
| Pendergrass et al. | Technical report: A toolkit for runtime detection of userspace implants | |
| Aboughadareh et al. | Mixed-mode malware and its analysis | |
| Mysliwietz et al. | Identifying rootkit stealth strategies | |
| Sparks et al. | Windows Rootkits-a Game of Hide and Seek | |
| Bianchi | Blacksheep: a tool for kernel rootkit detection, based on physical memory crowdsourced analysis |