TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Forged memory fools antimalware: A new development in rootkits

34 点作者 misham大约 14 年前

2 条评论

tptacek大约 14 年前
This does not look like a new development in rootkits. If I understand the article's summary: there's a rootkit that sets a hardware breakpoint on the memory it overwrote in the kernel, and checks to see if access are normal or abnormal; for abnormal access, it subs in fake value for the contents of that range of memory.<p>If you want to see where the state of the art in rootkits was in 2007(!), read:<p><a href="http://i.i.com.com/cnwk.1d/i/z/200701/bh-dc-07-Rutkowska-ppt.pdf" rel="nofollow">http://i.i.com.com/cnwk.1d/i/z/200701/bh-dc-07-Rutkowska-ppt...</a><p>...noting that this is Joanna Rutkowska explaining how to reprogram MMUs (here with MMIO remapping) to defeat <i>hardware DMA memory forensics</i>.
评论 #2522231 未加载
jevinskie大约 14 年前
Once your trusted space is compromised (the kernel space in this case), trying to detect or fix the compromise from that same space turns into a game of Core War: <a href="http://en.wikipedia.org/wiki/Core_War" rel="nofollow">http://en.wikipedia.org/wiki/Core_War</a><p>Scanning for rootkits from a hypervisor would solve this problem... as long as your hypervisor isn't compromised itself!
评论 #2522174 未加载
评论 #2522240 未加载