Transparent Protection of Commodity OS Kernels Using Hardware Virtualization

Michael Grace,Zhi Wang,Deepa Srinivasan,Jinku Li,Xuxian Jiang,Zhenkai Liang,Siarhei Liakh
DOI: https://doi.org/10.1007/978-3-642-16161-2_10
2010-01-01
Abstract:Kernel rootkits are among the most insidious threats to computer security today. By employing various code injection techniques, they are able to maintain an omnipotent presence in the compromised OS kernels. Existing preventive countermeasures typically employ virtualization technology as part of their solutions. However, they are still limited in either (1) requiring modifying the OS kernel source code for the protection or (2) leveraging software-based virtualization techniques such as binary translation with a high overhead to implement a Harvard architecture (which is robust to various code injection techniques used by kernel rootkits). In this paper, we introduce hvmHarvard, a hardware virtualization-based Harvard architecture that transparently protects commodity OS kernels from kernel rootkit attacks and significantly reduces the performance overhead. Our evaluation with a Xen-based prototype shows that it can transparently protect legacy OS kernels with rootkit resistance while introducing < 5% performance overhead.
What problem does this paper attempt to address?