4.7 Article

Back to Static Analysis for Kernel-Level Rootkit Detection

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2014.2337256

Keywords

Malware; rootkit; static analysis; kernel driver

Funding

  1. ITRC [12188/500 (91/8/2)]

Ask authors/readers for more resources

Rootkit's main goal is to hide itself and other modules present in the malware. Their stealthy nature has made their detection further difficult, especially in the case of kernel-level rootkits. There have been many dynamic analysis techniques proposed for detecting kernel-level rootkits, while on the other hand, static analysis has not been popular. This is perhaps due to its poor performance in detecting malware in general, which could be attributed to the level of obfuscation employed in binaries which make static analysis difficult if not impossible. In this paper, we make two important observations, first there is usually little obfuscation used in legitimate kernel-level code, as opposed to the malicious kernel-level code. Second, one of the main approaches to penetrate the Windows operating system is through kernel-level drivers. Therefore, by focusing on detecting malicious kernel drivers employed by the rootkit, one could detect the rootkit while avoiding the issues with current detection technique. Given these two observation, we propose a simple static analysis technique with the aim of detecting malicious driver. We first study the current trends in the implementation of kernel-level rookits. Afterward, we proposed a set of features to quantify the malicious behavior in kernel drivers. These features are then evaluated through a set of experiments on 4420 malicious and legitimate drivers, obtaining an accuracy of 98.15% in distinguishing between these drivers.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Software Engineering

A composite-metric based path selection technique for the Tor anonymity network

Sadegh Momeni Milajerdi, Mehdi Kharrazi

JOURNAL OF SYSTEMS AND SOFTWARE (2015)

Article Computer Science, Interdisciplinary Applications

Partov: a network simulation and emulation tool

B. Momeni, M. Kharrazi

JOURNAL OF SIMULATION (2016)

Article Education, Scientific Disciplines

Improving a Computer Networks Course Using the Partov Simulation Engine

Behnam Momeni, Mehdi Kharrazi

IEEE TRANSACTIONS ON EDUCATION (2012)

Article Computer Science, Theory & Methods

Payload Attribution via Character Dependent Multi-Bloom Filters

Mohammad Hashem Haghighat, Mehdi Tavakoli, Mehdi Kharrazi

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Software Engineering

LDMBL: An architecture for reducing code duplication in heavyweight binary instrumentations

Behnam Momeni, Mehdi Kharrazi

SOFTWARE-PRACTICE & EXPERIENCE (2018)

Article Engineering, Multidisciplinary

Twinner: A framework for automated software deobfuscation

B. Momeni, M. Kharrazi

SCIENTIA IRANICA (2019)

Article Engineering, Multidisciplinary

Detection of fast-flux botnets through DNS traffic analysis

E. Soltanaghaei, M. Kharrazi

SCIENTIA IRANICA (2015)

Article Engineering, Electrical & Electronic

Performance study of common image steganography and steganalysis techniques

Mehdi Kharrazi, Husrev T. Sencar, Nasir Mernon

JOURNAL OF ELECTRONIC IMAGING (2006)

Article Engineering, Electrical & Electronic

Image steganalysis with binary similarity measures

I Avcibas, M Kharrazi, N Memon, B Sankur

EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING (2005)

No Data Available