Abstract
As new vulnerabilities on Windows systems are reported endlessly, it is more practical to stop polymorphic malicious code from exploiting these vulnerabilities by building an behavior-based monitor, rather than adopting a signature-based detection system or fixing these vulnerabilities. Many behavior-based monitors have been proposed for Windows systems to serve this purpose. Some of them hook high-level system APIs to detect the suspicious behaviors of code. However, they cannot detect malicious code that directly invokes Native APIs. In this paper, we present a novel security scheme that hooks Native APIs in the kernel mode. This method effectively prevents malicious code calling Native APIs directly. It introduces an average eight percent computation overhead into the system. Analyses and a series of experiments are given in the paper to support our claims.
| Original language | English |
|---|---|
| Pages (from-to) | 813-823 |
| Number of pages | 11 |
| Journal | IEEE Transactions on Computers |
| Volume | 60 |
| Issue number | 6 |
| Early online date | 17 Feb 2011 |
| DOIs | |
| Publication status | Published - Jun 2011 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 16 Peace, Justice and Strong Institutions
User-Defined Keywords
- API hooking
- code injection.
- Windows API
Fingerprint
Dive into the research topics of 'A native APIs protection mechanism in the kernel mode against malicious code'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver