Publication detail

Hijacking the Linux Kernel

PROCHÁZKA, B. VOJNAR, T. DRAHANSKÝ, M.

Original Title

Hijacking the Linux Kernel

Type

article in a collection out of WoS and Scopus

Language

English

Original Abstract

In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a di erent function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The attack is applicable to all kernels from the 2.6 series on the Intel architecture. Due to this, rootkits based on this kind of technique represent a high risk for Linux administrators.

Keywords

computer security, operating system, Linux, rootkit, system call, IA-32

Authors

PROCHÁZKA, B.; VOJNAR, T.; DRAHANSKÝ, M.

RIV year

2010

Released

22. 10. 2010

Publisher

Masaryk University

Location

Brno

ISBN

978-80-87342-10-7

Book

MEMICS 2010 - Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science

Pages from

143

Pages to

150

Pages count

8

BibTex

@inproceedings{BUT35051,
  author="Boris {Procházka} and Tomáš {Vojnar} and Martin {Drahanský}",
  title="Hijacking the Linux Kernel",
  booktitle="MEMICS 2010 - Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science",
  year="2010",
  pages="143--150",
  publisher="Masaryk University",
  address="Brno",
  isbn="978-80-87342-10-7"
}