Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and they have seriously undermined the integrity of the entire computer system. To eliminate these threats, it is imperative to develop innovative solutions running below the attack surface. This paper presents MGuard, a new most inner ring solution for inspecting the system integrity that is directly integrated with the DRAM DIMM devices. More specifically, we design a programmable guard that is integrated with the advanced memory buffer of FB-DIMM to continuously monitor all the memory traffic and detect the system integrity violations. Unlike the existing approaches that are either snapshot-based or lack compatibility and flexibility, MGuard ...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Modern malware and spyware platforms attack existing antivirus solutions and even Microsoft PatchGua...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Kernel rootkits can exploit an operating system and enable future accessibility and control, despite...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
The integrity of operating system (OS) kernels is of paramount importance in order to ensure the sec...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Modern malware and spyware platforms attack existing antivirus solutions and even Microsoft PatchGua...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Kernel rootkits can exploit an operating system and enable future accessibility and control, despite...
Abstract—The advent of cloud computing and inexpensive multi-core desktop architectures has led to t...
The integrity of operating system (OS) kernels is of paramount importance in order to ensure the sec...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
Over the past few years, virtualization has been em-ployed to environments ranging from densely popu...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
runtime memory, performance evaluation An important goal of software security is to ensure sensitive...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
Modern malware and spyware platforms attack existing antivirus solutions and even Microsoft PatchGua...