Abstract—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to monitor and control the system calls. By using the LSM we can inspect the activity of unknown malicious processes. However, a sophisticated attacker could breach the kernel configurations using the rootkits. Furthermore since the monitoring results of the malicious process activity are stored as a file on Hard Disk Drive (HDD), it will be easily manipulated by the attacker. In this paper, we propose a secure monitoring scheme that ...
An operating system kernel is the core of system software which is responsible for the integrity and...
The access control mechanisms of existing mainstream operating systems are inadequate to provide str...
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, ...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
In this paper, we present an approach, sup-ported by software tools, for maintaining the correctness...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
The integrity of operating system (OS) kernels is of paramount importance in order to ensure the sec...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
Until the availability of Kernel 2.6 the Linux op-erating system lacked general support to integrate...
In current extensible monolithic operating systems, load-able kernel modules (LKM) have unrestricted...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
Kernel-mode rootkits represent a considerable threat to any computer system, as they provide an intr...
To protect the integrity of operating system kernels, we present Vigilare system, a kernel integrity...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
An operating system kernel is the core of system software which is responsible for the integrity and...
The access control mechanisms of existing mainstream operating systems are inadequate to provide str...
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, ...
Obfuscation and cryptography technologies are applied to malware to make the detection of malware th...
In this paper, we present an approach, sup-ported by software tools, for maintaining the correctness...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
The integrity of operating system (OS) kernels is of paramount importance in order to ensure the sec...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
Until the availability of Kernel 2.6 the Linux op-erating system lacked general support to integrate...
In current extensible monolithic operating systems, load-able kernel modules (LKM) have unrestricted...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
Kernel-mode rootkits represent a considerable threat to any computer system, as they provide an intr...
To protect the integrity of operating system kernels, we present Vigilare system, a kernel integrity...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
An operating system kernel is the core of system software which is responsible for the integrity and...
The access control mechanisms of existing mainstream operating systems are inadequate to provide str...
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, ...