Dual-mode kernel rootkit scan and recovery with process ID Brute-Force

Ji Won Choi, Sang Jun Park, Seong Jin Byeon, Dongho Kim

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Rootkit is a malware that attacks a system continuously by hiding files, processes, and registries in a system. DKOM (Direct Kernel Object Manipulation) is a process hiding technique that manipulates a kernel object. AL-DKOM (All Link—Direct Kernel Object Manipulation) is an extended version of DKOM that manipulates all the modifiable links in the kernel object. It is difficult to detect with existing tools. This paper designed and implemented a new AL-DKOM detection system using dual-mode operation and PIDB-based process scan that was not possible with existing List Walking method. In addition, we explain the recovery procedure of the infected system and flexible system management via process recovery that has not been tried before. We then show the performance of the new system by comparing and analyzing the effectiveness of the new system and existing rootkit scanning tools with real rootkit samples.

Original languageEnglish
Pages (from-to)1568-1572
Number of pages5
JournalAdvanced Science Letters
Volume23
Issue number3
DOIs
StatePublished - Mar 2017

Keywords

  • AL-DKOM
  • Dual-mode
  • PIDB
  • Rootkit

Fingerprint

Dive into the research topics of 'Dual-mode kernel rootkit scan and recovery with process ID Brute-Force'. Together they form a unique fingerprint.

Cite this