Publication Details

Hijacking the Linux Kernel

PROCHÁZKA, B.; VOJNAR, T.; DRAHANSKÝ, M. Hijacking the Linux Kernel. MEMICS 2010 - Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science. Brno: Masaryk University, 2010. p. 143-150. ISBN: 978-80-87342-10-7.
Czech title
Únos z obsluhy linuxového jádra
Type
conference paper
Language
English
Authors
Procházka Boris, Ing.
Vojnar Tomáš, prof. Ing., Ph.D. (DITS)
Drahanský Martin, prof. Ing., Ph.D.
Keywords

computer security, operating system, Linux, rootkit, system call, IA-32

Abstract

In this paper, a new method of hijacking the Linux kernel is
presented. It is based on analysing the Linux system call handler, where a proper
set of instructions is subsequently replaced by a jump to a dierent function.
The ability to change the execution
flow in the middle of an existing function represents a unique approach in Linux
kernel hacking. The attack is applicable to all kernels from the 2.6 series on
the Intel architecture. Due to this, rootkits based on this kind of technique
represent a high risk for Linux administrators.

Published
2010
Pages
143–150
Proceedings
MEMICS 2010 - Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science
Conference
MEMICS'10 -- 6th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Mikulov, CZ
ISBN
978-80-87342-10-7
Publisher
Masaryk University
Place
Brno
BibTeX
@inproceedings{BUT35051,
  author="Boris {Procházka} and Tomáš {Vojnar} and Martin {Drahanský}",
  title="Hijacking the Linux Kernel",
  booktitle="MEMICS 2010 - Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science",
  year="2010",
  pages="143--150",
  publisher="Masaryk University",
  address="Brno",
  isbn="978-80-87342-10-7"
}
Back to top