VMX-rootkit : implementing malware with hardware virtual machine extensions

Stealth Malware (Rootkit) is a malicious software used by attackers who wish to run their code on a compromised computer without being detected. Over the years, rootkits have targeted different operating systems and have used different techniques and mechanisms to avoid detection. In late 2005 and e...

Full description

Bibliographic Details
Main Author: Esoul, O.
Published: University of Salford 2008
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575040
id ndltd-bl.uk-oai-ethos.bl.uk-575040
record_format oai_dc
spelling ndltd-bl.uk-oai-ethos.bl.uk-5750402018-02-05T15:26:54ZVMX-rootkit : implementing malware with hardware virtual machine extensionsEsoul, O.2008Stealth Malware (Rootkit) is a malicious software used by attackers who wish to run their code on a compromised computer without being detected. Over the years, rootkits have targeted different operating systems and have used different techniques and mechanisms to avoid detection. In late 2005 and early 2006, both, Intel™ and AMD™ incorporated explicit hardware support for virtualization into their CPUs. While this hardware support can help simplify the design and the implementation of a light-weight and efficient Virtual Machine Monitors (VMMs), this technology has introduced a new powerful mechanism that can be used by malware to create extremely stealthy rootkit called hardware-assisted virtual machine rootkit (HVM rootkit). An HVM rootkit is capable of totally controlling a compromised system by installing a small VMM (a.k.a. hyper- visor) underneath the operating system and its applications without altering any part of the target operating system or any part of its applications. It places the existing operating system into a virtual machine and turns it into a guest operating system on-the-fly without a reboot. The guest operating system is then totally governed and manipulated by the malicious hypervisor. In this thesis I have investigated the design and implementation of a minimal hypervisor based Rootkit that takes advantage of Intel Visualization Technology (Intel VT) for the IA-32 architecture (VT-x) and Microsoft Windows XP SP2 as the target operating system.005.8University of Salfordhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575040http://usir.salford.ac.uk/26667/Electronic Thesis or Dissertation
collection NDLTD
sources NDLTD
topic 005.8
spellingShingle 005.8
Esoul, O.
VMX-rootkit : implementing malware with hardware virtual machine extensions
description Stealth Malware (Rootkit) is a malicious software used by attackers who wish to run their code on a compromised computer without being detected. Over the years, rootkits have targeted different operating systems and have used different techniques and mechanisms to avoid detection. In late 2005 and early 2006, both, Intel™ and AMD™ incorporated explicit hardware support for virtualization into their CPUs. While this hardware support can help simplify the design and the implementation of a light-weight and efficient Virtual Machine Monitors (VMMs), this technology has introduced a new powerful mechanism that can be used by malware to create extremely stealthy rootkit called hardware-assisted virtual machine rootkit (HVM rootkit). An HVM rootkit is capable of totally controlling a compromised system by installing a small VMM (a.k.a. hyper- visor) underneath the operating system and its applications without altering any part of the target operating system or any part of its applications. It places the existing operating system into a virtual machine and turns it into a guest operating system on-the-fly without a reboot. The guest operating system is then totally governed and manipulated by the malicious hypervisor. In this thesis I have investigated the design and implementation of a minimal hypervisor based Rootkit that takes advantage of Intel Visualization Technology (Intel VT) for the IA-32 architecture (VT-x) and Microsoft Windows XP SP2 as the target operating system.
author Esoul, O.
author_facet Esoul, O.
author_sort Esoul, O.
title VMX-rootkit : implementing malware with hardware virtual machine extensions
title_short VMX-rootkit : implementing malware with hardware virtual machine extensions
title_full VMX-rootkit : implementing malware with hardware virtual machine extensions
title_fullStr VMX-rootkit : implementing malware with hardware virtual machine extensions
title_full_unstemmed VMX-rootkit : implementing malware with hardware virtual machine extensions
title_sort vmx-rootkit : implementing malware with hardware virtual machine extensions
publisher University of Salford
publishDate 2008
url http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575040
work_keys_str_mv AT esoulo vmxrootkitimplementingmalwarewithhardwarevirtualmachineextensions
_version_ 1718613048242995200