VMX-rootkit : implementing malware with hardware virtual machine extensions
Stealth Malware (Rootkit) is a malicious software used by attackers who wish to run their code on a compromised computer without being detected. Over the years, rootkits have targeted different operating systems and have used different techniques and mechanisms to avoid detection. In late 2005 and e...
Main Author: | |
---|---|
Published: |
University of Salford
2008
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575040 |
id |
ndltd-bl.uk-oai-ethos.bl.uk-575040 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-bl.uk-oai-ethos.bl.uk-5750402018-02-05T15:26:54ZVMX-rootkit : implementing malware with hardware virtual machine extensionsEsoul, O.2008Stealth Malware (Rootkit) is a malicious software used by attackers who wish to run their code on a compromised computer without being detected. Over the years, rootkits have targeted different operating systems and have used different techniques and mechanisms to avoid detection. In late 2005 and early 2006, both, Intel™ and AMD™ incorporated explicit hardware support for virtualization into their CPUs. While this hardware support can help simplify the design and the implementation of a light-weight and efficient Virtual Machine Monitors (VMMs), this technology has introduced a new powerful mechanism that can be used by malware to create extremely stealthy rootkit called hardware-assisted virtual machine rootkit (HVM rootkit). An HVM rootkit is capable of totally controlling a compromised system by installing a small VMM (a.k.a. hyper- visor) underneath the operating system and its applications without altering any part of the target operating system or any part of its applications. It places the existing operating system into a virtual machine and turns it into a guest operating system on-the-fly without a reboot. The guest operating system is then totally governed and manipulated by the malicious hypervisor. In this thesis I have investigated the design and implementation of a minimal hypervisor based Rootkit that takes advantage of Intel Visualization Technology (Intel VT) for the IA-32 architecture (VT-x) and Microsoft Windows XP SP2 as the target operating system.005.8University of Salfordhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575040http://usir.salford.ac.uk/26667/Electronic Thesis or Dissertation |
collection |
NDLTD |
sources |
NDLTD |
topic |
005.8 |
spellingShingle |
005.8 Esoul, O. VMX-rootkit : implementing malware with hardware virtual machine extensions |
description |
Stealth Malware (Rootkit) is a malicious software used by attackers who wish to run their code on a compromised computer without being detected. Over the years, rootkits have targeted different operating systems and have used different techniques and mechanisms to avoid detection. In late 2005 and early 2006, both, Intel™ and AMD™ incorporated explicit hardware support for virtualization into their CPUs. While this hardware support can help simplify the design and the implementation of a light-weight and efficient Virtual Machine Monitors (VMMs), this technology has introduced a new powerful mechanism that can be used by malware to create extremely stealthy rootkit called hardware-assisted virtual machine rootkit (HVM rootkit). An HVM rootkit is capable of totally controlling a compromised system by installing a small VMM (a.k.a. hyper- visor) underneath the operating system and its applications without altering any part of the target operating system or any part of its applications. It places the existing operating system into a virtual machine and turns it into a guest operating system on-the-fly without a reboot. The guest operating system is then totally governed and manipulated by the malicious hypervisor. In this thesis I have investigated the design and implementation of a minimal hypervisor based Rootkit that takes advantage of Intel Visualization Technology (Intel VT) for the IA-32 architecture (VT-x) and Microsoft Windows XP SP2 as the target operating system. |
author |
Esoul, O. |
author_facet |
Esoul, O. |
author_sort |
Esoul, O. |
title |
VMX-rootkit : implementing malware with hardware virtual machine extensions |
title_short |
VMX-rootkit : implementing malware with hardware virtual machine extensions |
title_full |
VMX-rootkit : implementing malware with hardware virtual machine extensions |
title_fullStr |
VMX-rootkit : implementing malware with hardware virtual machine extensions |
title_full_unstemmed |
VMX-rootkit : implementing malware with hardware virtual machine extensions |
title_sort |
vmx-rootkit : implementing malware with hardware virtual machine extensions |
publisher |
University of Salford |
publishDate |
2008 |
url |
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.575040 |
work_keys_str_mv |
AT esoulo vmxrootkitimplementingmalwarewithhardwarevirtualmachineextensions |
_version_ |
1718613048242995200 |