Hooksafe
Hooksafe is a hypervisor-based lightweight system that protects an operating system's kernel hooks from rootkit attacks.[1]
It prevents thousands of kernel hooks in the guest operating system from being hijacked. This is achieved by making a shadow copy of all the kernel hooks at one central place and adding an indirection layer on it to regulate attempts to access the hooks. A prototype of Hooksafe was used on a Linux guest and protected nearly 6000 kernel hooks.[2][1] It focuses on protecting kernel control data that are function pointers. It provides large scale hook protection with small performance overhead[3]
History
Prior rootkit thwarting systems include: Panorama, Hookfinder and systems focused on analyzing rootkit behavior, Copilot, VMwatcher and systems that detect rootkits based on symptoms, Patagonix, NICKLE and systems aimed to preserve kernel code integrity by preventing malicious rootkit code from executing.[1]
See also
References
- ↑ 1.0 1.1 1.2 Countering Kernel Rootkits with Lightweight Hook Protection. https://research.microsoft.com/en-us/um/people/wdcui/papers/hooksafe-ccs09.pdf.
- ↑ Jackson Higgins, Kelly (3 November 2009). "Researchers Create Hypervisor-Based Tool For Blocking Rootkits". http://www.darkreading.com/attacks-breaches/researchers-create-hypervisor-based-tool-for-blocking-rootkits-/d/d-id/1132269.
- ↑ "Boffins boast newfangled rootkit blocker". https://www.theregister.co.uk/2009/11/11/hooksafe_rootkit_protection/.
External links
Original source: https://en.wikipedia.org/wiki/Hooksafe.
Read more |