HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware

Authors

  • Chonghua Wang China Industrial Control System Cyber Emergency Response Team
  • Libo Yin China Industrial Control System Cyber Emergency Response Team
  • Jun Li China Industrial Control System Cyber Emergency Response Team
  • Xuehong Chen China Industrial Control System Cyber Emergency Response Team
  • Rongchao Yin China Industrial Control System Cyber Emergency Response Team
  • Xiaochun Yun National Computer Network Emergency Response Technical Team/Coordination Center of Chinar
  • Yang Jiao Chinese Academy of Sciences
  • Zhiyu Hao Chinese Academy of Sciences

DOI:

https://doi.org/10.4108/eai.8-4-2019.157417

Keywords:

Provenance Tracing, System Logging, Kernel Malware, Forensic Investigation

Abstract

Provenance of system subjects (e.g., processes) and objects (e.g., files) are very useful for many forensics tasks. In our analysis and comparison of existing Linux provenance tracing systems, we found that most systems assume the Linux kernel to be in the trust base, making these systems vulnerable to kernel level malware. To address this problem, we present HProve, a hypervisor level provenance tracing system to reconstruct kernel malware attack story. It monitors the execution of kernel functions and sensitive objects, and correlates the system subjects and objects to form the causality dependencies for the attacks. We evaluated our prototype on 12 real world kernel malware samples, and the results show that it can correctly identify the provenance behaviors of the kernel malware with a minor performance overhead.

Downloads

Published

25-01-2019

How to Cite

HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. (2019). EAI Endorsed Transactions on Security and Safety, 5(18), e5. https://doi.org/10.4108/eai.8-4-2019.157417