{"title":"Kernel-level hidden rootkit detection based on eBPF","authors":"Yun-Che Yu, Ci-Yi Hung, Li-Der Chou","doi":"10.1016/j.cose.2025.104582","DOIUrl":null,"url":null,"abstract":"<div><div>With the rapid development of the Internet, entrusting data and services to cloud providers has become a prevailing trend among enterprises. However, this shift has also introduced new security threats, particularly the potential dangers posed by rootkits. Once these malicious software programs gain control of a system, they can conceal the activities of attackers. In particular, kernel-level rootkits are especially threatening and markedly difficult to detect. To counter kernel-level rootkit attacks, this study proposes a detection mechanism called the hidden kernel rootkit detector, specifically designed to detect hidden objects within Linux kernel-level rootkits. The mechanism utilizes the extended Berkeley Packet Filter technology and checks system calls during execution by comparing them with backed-up addresses to determine if they have been hijacked. If hijacking is detected, the system call is restored to its original address, and the attacker is removed from the system. Before a context switch occurs, the integrity of the process and module about to be executed is verified, and before a socket sends or receives messages, it is checked for existence within the system to defend against direct kernel object manipulation attacks. If system objects are found to have been tampered with, then they are restored to their original state, and the attacker is removed from the system.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"157 ","pages":"Article 104582"},"PeriodicalIF":4.8000,"publicationDate":"2025-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825002718","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the rapid development of the Internet, entrusting data and services to cloud providers has become a prevailing trend among enterprises. However, this shift has also introduced new security threats, particularly the potential dangers posed by rootkits. Once these malicious software programs gain control of a system, they can conceal the activities of attackers. In particular, kernel-level rootkits are especially threatening and markedly difficult to detect. To counter kernel-level rootkit attacks, this study proposes a detection mechanism called the hidden kernel rootkit detector, specifically designed to detect hidden objects within Linux kernel-level rootkits. The mechanism utilizes the extended Berkeley Packet Filter technology and checks system calls during execution by comparing them with backed-up addresses to determine if they have been hijacked. If hijacking is detected, the system call is restored to its original address, and the attacker is removed from the system. Before a context switch occurs, the integrity of the process and module about to be executed is verified, and before a socket sends or receives messages, it is checked for existence within the system to defend against direct kernel object manipulation attacks. If system objects are found to have been tampered with, then they are restored to their original state, and the attacker is removed from the system.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.