Detail publikace

Hijacking the Linux Kernel

PROCHÁZKA, B. VOJNAR, T. DRAHANSKÝ, M.

Originální název

Hijacking the Linux Kernel

Typ

článek ve sborníku mimo WoS a Scopus

Jazyk

angličtina

Originální abstrakt

In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a di erent function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The attack is applicable to all kernels from the 2.6 series on the Intel architecture. Due to this, rootkits based on this kind of technique represent a high risk for Linux administrators.

Klíčová slova

computer security, operating system, Linux, rootkit, system call, IA-32

Autoři

PROCHÁZKA, B.; VOJNAR, T.; DRAHANSKÝ, M.

Rok RIV

2011

Vydáno

11. 3. 2011

Nakladatel

Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik

Místo

Dagstuhl

ISBN

978-3-939897-22-4

Kniha

Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS'10) -- Selected Papers

Edice

OASIcs proceedengs from MEMICS'10 papers

ISSN

2190-6807

Periodikum

OpenAccess Series in Informatics (OASIcs)

Ročník

16

Číslo

2

Stát

Spolková republika Německo

Strany od

85

Strany do

92

Strany počet

8

URL

BibTex

@inproceedings{BUT91166,
  author="Boris {Procházka} and Tomáš {Vojnar} and Martin {Drahanský}",
  title="Hijacking the Linux Kernel",
  booktitle="Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS'10) -- Selected Papers",
  year="2011",
  series="OASIcs proceedengs from MEMICS'10 papers",
  journal="OpenAccess Series in Informatics (OASIcs)",
  volume="16",
  number="2",
  pages="85--92",
  publisher="Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik",
  address="Dagstuhl",
  isbn="978-3-939897-22-4",
  issn="2190-6807",
  url="http://drops.dagstuhl.de/opus/volltexte/2011/3063/pdf/7.pdf"
}