Rootkit-resistant disks
- 27 October 2008
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 403-416
- https://doi.org/10.1145/1455770.1455821
Abstract
Rootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often unknowingly. Suchmalware becomes even more dangerous when it is persistent-infected disk images allow the malware to exist across reboots and prevent patches or system repairs from being successfully applied. In this paper, we introduce rootkit-resistant disks (RRD) that label all immutable system binaries and configuration files at installation time. During normal operation, the disk controller inspects all write operations received from the host operating system and denies those made for labeled blocks. To upgrade, the host is booted into a safe state and system blocks can only be modified if a security token is attached to the disk controller. By enforcing immutability at the disk controller, we prevent a compromised operating system from infecting its on-disk image. We implement the RRD on a Linksys NSLU2 network storage device by extending the I/O processing on the embedded disk controller running the SlugOS Linux distribution. Our performance evaluation shows that the RRD exhibits an overhead of less than 1% for filesystem creation and less than 1.5% during I/O intensive Postmark benchmarking. We further demonstrate the viability of our approach by preventing a rootkit collected from the wild from infecting the OS image. In this way, we show that RRDs not only prevent rootkit persistence, but do so in an efficient way.Keywords
This publication has 16 references indexed in Scilit:
- On the infeasibility of modeling polymorphic shellcodePublished by Association for Computing Machinery (ACM) ,2007
- PanoramaPublished by Association for Computing Machinery (ACM) ,2007
- The top speed of flash wormsPublished by Association for Computing Machinery (ACM) ,2004
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Reliable identification of bounded-length viruses is NP-completeIEEE Transactions on Information Theory, 2003
- Fast and secure distributed read-only file systemACM Transactions on Computer Systems, 2002
- Building the IBM 4758 secure coprocessorComputer, 2001
- A cost-effective, high-bandwidth storage architecturePublished by Association for Computing Machinery (ACM) ,1998
- The internet worm program: an analysisACM SIGCOMM Computer Communication Review, 1989
- Reflections on trusting trustCommunications of the ACM, 1984