KernelNewbies:

Rootkit blocking using virtualization

Rootkits can affect both Unix style and Windows systems. They are modifications to the kernel that are made by modifying the operating system kernel in memory, often modifying the system call table or some syscall kernel code, to hide the fact that the system has been changed, or to block certain functionality.

Virtualization gives us a unique avenue to stop rootkits from infecting virtual machines: when bootup of the virtual machine is almost done, we can simply mark all the kernel memory of the virtual machine read-only. That way rootkits will not be able to infect the kernel in the virtual machine. Since untrusted applications only run in the virtual machine, and not in the host OS, there is no way to circumvent this security mechanism.

Of course, there are a number of issues that make this project difficult:

Difficulty: 7

Contact: Rik van Riel - riel (at) redhat.com


CategoryKernelProjects

KernelNewbies: KernelProjects/VirtRootkitBlocker (last edited 2017-12-30 01:30:00 by localhost)