Comprehensive and efficient protection of kernel control data

Published

Journal Article

Protecting kernel control data (e.g., function pointers and return addresses) has been a serious issue plaguing rootkit defenders. In particular, rootkit authors only need to compromise one piece of control data to launch their attacks, while defenders need to protect thousands of such values widely scattered across kernel memory space. Worse, some of this data (e.g., return addresses) is volatile and can be dynamically generated at run time. Existing solutions, however, offer either incomplete protection or excessive performance overhead. To overcome these limitations, we present indexed hooks, a scheme that greatly facilitates kernel control-flow enforcement by thoroughly transforming and restricting kernel control data to take only legal jump targets (allowed by the kernel's control-flow graph). By doing so, we can severely limit the attackers' possibility of exploiting them as an infection vector to launch rootkit attacks. To validate our approach, we have developed a compiler-based prototype that implements this technique in the FreeBSD 8.0 kernel, transforming 49025 control transfer instructions ($\sim$ 7.25% of the code base) to use indexed hooks instead of direct pointers. Our evaluation results indicate that our approach is generic, effective, and can be implemented on commodity hardware with a low performance overhead ($<$5% based on benchmarks). © 2006 IEEE.

Full Text

Duke Authors

Cited Authors

  • Li, J; Wang, Z; Bletsch, T; Srinivasan, D; Grace, M; Jiang, X

Published Date

  • December 1, 2011

Published In

Volume / Issue

  • 6 / 4

Start / End Page

  • 1404 - 1417

International Standard Serial Number (ISSN)

  • 1556-6013

Digital Object Identifier (DOI)

  • 10.1109/TIFS.2011.2159712

Citation Source

  • Scopus