Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits

Home / Publications / Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits

Xueyang Wang and Ramesh Karri

Kernel rootkits are formidable threats to computer systems. They are stealthy and can have unrestricted access to system resources. This paper presents NumChecker, a new virtual machine (VM) monitor based framework to detect and identify control-flow modifying kernel rootkits in a guest VM. NumChecker detects and identifies malicious modifications to a system call in the guest VM by measuring the number of certain hardware events that occur during the system call’s execution. To automatically count these events, NumChecker leverages the hardware performance counters (HPCs), which exist in modern processors.