Přístupnostní navigace
E-přihláška
Vyhledávání Vyhledat Zavřít
Detail publikace
PROCHÁZKA, B. VOJNAR, T. DRAHANSKÝ, M.
Originální název
Hijacking the Linux Kernel
Typ
článek ve sborníku mimo WoS a Scopus
Jazyk
angličtina
Originální abstrakt
In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a dierent function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The attack is applicable to all kernels from the 2.6 series on the Intel architecture. Due to this, rootkits based on this kind of technique represent a high risk for Linux administrators.
Klíčová slova
computer security, operating system, Linux, rootkit, system call, IA-32
Autoři
PROCHÁZKA, B.; VOJNAR, T.; DRAHANSKÝ, M.
Rok RIV
2010
Vydáno
22. 10. 2010
Nakladatel
Masaryk University
Místo
Brno
ISBN
978-80-87342-10-7
Kniha
MEMICS 2010 - Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science
Strany od
143
Strany do
150
Strany počet
8
BibTex
@inproceedings{BUT35051, author="Boris {Procházka} and Tomáš {Vojnar} and Martin {Drahanský}", title="Hijacking the Linux Kernel", booktitle="MEMICS 2010 - Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science", year="2010", pages="143--150", publisher="Masaryk University", address="Brno", isbn="978-80-87342-10-7" }