This Ph.D thesis addresses the integrity preservation of current operating systems. The main goal is to counter current and future threats coming from malware that infects the kernel of these systems (as kernel rootkits) or at least that provoke a loss of their integrity (as hypervisor rootkits). The first part of this document focuses on such malware. First, logical attacks are presented globally. Then, a classification of malicious actions that lead to the loss of kernel integrity is proposed. Finally, the outcomes of a study on kernel rootkits are given and the creation of an original rootkit is explained. The second part deals with kernel protection. After describing the state of the art, an original approach is proposed, based on the c...
Abstract. In monolithic operating systems, the kernel is the piece of code that executes with the hi...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
Kernel extensions are widely used by attackers to com-promise the operating system kernel. With the ...
This Ph.D thesis addresses the integrity preservation of current operating systems. The main goal is...
Kernel rootkits pose significant challenges on defensive techniques as they run at the highest privi...
Kernel-mode rootkits represent a considerable threat to any computer system, as they provide an intr...
As the foundation of the trusted computing base, the operating system kernel is a valuable target f...
The operating system kernel serves as the root of trust for all applications running on the computer...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Kernel rootkits are a special category of malware that are deployed directly in the kernel and hence...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
Operating system kernels isolate applications from other malicious software via protected memory cr...
In monolithic operating systems, the kernel is the piece of code that executes with the highest pri...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
The integrity of operating system (OS) kernels is of paramount importance in order to ensure the sec...
Abstract. In monolithic operating systems, the kernel is the piece of code that executes with the hi...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
Kernel extensions are widely used by attackers to com-promise the operating system kernel. With the ...
This Ph.D thesis addresses the integrity preservation of current operating systems. The main goal is...
Kernel rootkits pose significant challenges on defensive techniques as they run at the highest privi...
Kernel-mode rootkits represent a considerable threat to any computer system, as they provide an intr...
As the foundation of the trusted computing base, the operating system kernel is a valuable target f...
The operating system kernel serves as the root of trust for all applications running on the computer...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Kernel rootkits are a special category of malware that are deployed directly in the kernel and hence...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
Operating system kernels isolate applications from other malicious software via protected memory cr...
In monolithic operating systems, the kernel is the piece of code that executes with the highest pri...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
The integrity of operating system (OS) kernels is of paramount importance in order to ensure the sec...
Abstract. In monolithic operating systems, the kernel is the piece of code that executes with the hi...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
Kernel extensions are widely used by attackers to com-promise the operating system kernel. With the ...