Publication detail

Hijacking the Linux Kernel

PROCHÁZKA, B. VOJNAR, T. DRAHANSKÝ, M.

Original Title

Hijacking the Linux Kernel

English Title

Hijacking the Linux Kernel

Type

conference paper

Language

en

Original Abstract

In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a di erent function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The attack is applicable to all kernels from the 2.6 series on the Intel architecture. Due to this, rootkits based on this kind of technique represent a high risk for Linux administrators.

English abstract

In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a di erent function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The attack is applicable to all kernels from the 2.6 series on the Intel architecture. Due to this, rootkits based on this kind of technique represent a high risk for Linux administrators.

Keywords

computer security, operating system, Linux, rootkit, system call, IA-32

RIV year

2010

Released

22.10.2010

Publisher

Masaryk University

Location

Brno

ISBN

978-80-87342-10-7

Book

MEMICS 2010 - Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science

Edition

NEUVEDEN

Edition number

NEUVEDEN

Pages from

143

Pages to

150

Pages count

8

Documents

BibTex


@inproceedings{BUT35051,
  author="Boris {Procházka} and Tomáš {Vojnar} and Martin {Drahanský}",
  title="Hijacking the Linux Kernel",
  annote="In this paper, a new method of hijacking the Linux kernel is
presented. It is based on analysing the Linux system call handler, where a proper
set of instructions is subsequently replaced by a jump to a dierent function.
The ability to change the execution 
flow in the middle of an existing function represents a unique approach in Linux
kernel hacking. The attack is applicable to all kernels from the 2.6 series on
the Intel architecture. Due to this, rootkits based on this kind of technique
represent a high risk for Linux administrators.",
  address="Masaryk University",
  booktitle="MEMICS 2010 - Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science",
  chapter="35051",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Masaryk University",
  year="2010",
  month="october",
  pages="143--150",
  publisher="Masaryk University",
  type="conference paper"
}