2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing 2010
DOI: 10.1109/isorc.2010.12
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Monitoring Service for Multi-core Embedded Systems

Abstract: The recent increase in complexity and functionality in embedded systems makes them more vulnerable to rootkit-type attacks, raising the need for integrity management systems. However, as of today there is no such system that can guarantee the system's safety while matching the low-resource, real-time and multi-core requirements of embedded systems. In this paper, we present a Virtual Machine Monitor (VMM) based monitoring service for embedded systems that checks the actual kernel data against a safe data speci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
4
2
1

Relationship

5
2

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…We use an integrity checker running in xv6 that can check the system call table of the embedded Linux and the hide task rootkit that uses the DKOM mechanism to infect the Linux kernel [25]. This integrity checker occupies less than 8 Kbytes memory space and is stored in the RAM file system.…”
Section: B Evaluationmentioning
confidence: 99%
“…We use an integrity checker running in xv6 that can check the system call table of the embedded Linux and the hide task rootkit that uses the DKOM mechanism to infect the Linux kernel [25]. This integrity checker occupies less than 8 Kbytes memory space and is stored in the RAM file system.…”
Section: B Evaluationmentioning
confidence: 99%
“…Since we focus on applying our architecture to embedded systems, maybe real-time systems, it is better to use a monitoring service with the passive pattern to reduce the overhead of the guest OS. We choose a passive monitoring service that can check the entries of the Linux system call table and detect the hide task rootkit that uses the DKOM (Direct Kernel Object Manipulation) mechanism to infect the kernel data [21].…”
Section: Implementation Environmentmentioning
confidence: 99%
“…Conversely, for GPOS, we offer an additional detection program, a monitoring service [17], to detect abnormal SMP Linux activities. As in some Linux rootkits that try to insert a kernel module to change the execution of important system calls or modify the system call table, GPOS intrusions could also take control of SPUMONE's interrupt manipulation or other operations.…”
Section: Additional System Protection By Auxiliary Subsystemmentioning
confidence: 99%