Skip to main navigation Skip to search Skip to main content

A native APIs protection mechanism in the kernel mode against malicious code

  • Hung Min Sun*
  • , Hsun Wang
  • , King Hang Wang
  • , Chien Ming Chen
  • *Corresponding author for this work

Research output: Contribution to journalJournal articlepeer-review

21 Citations (Scopus)

Abstract

As new vulnerabilities on Windows systems are reported endlessly, it is more practical to stop polymorphic malicious code from exploiting these vulnerabilities by building an behavior-based monitor, rather than adopting a signature-based detection system or fixing these vulnerabilities. Many behavior-based monitors have been proposed for Windows systems to serve this purpose. Some of them hook high-level system APIs to detect the suspicious behaviors of code. However, they cannot detect malicious code that directly invokes Native APIs. In this paper, we present a novel security scheme that hooks Native APIs in the kernel mode. This method effectively prevents malicious code calling Native APIs directly. It introduces an average eight percent computation overhead into the system. Analyses and a series of experiments are given in the paper to support our claims.

Original languageEnglish
Pages (from-to)813-823
Number of pages11
JournalIEEE Transactions on Computers
Volume60
Issue number6
Early online date17 Feb 2011
DOIs
Publication statusPublished - Jun 2011

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 16 - Peace, Justice and Strong Institutions
    SDG 16 Peace, Justice and Strong Institutions

User-Defined Keywords

  • API hooking
  • code injection.
  • Windows API

Fingerprint

Dive into the research topics of 'A native APIs protection mechanism in the kernel mode against malicious code'. Together they form a unique fingerprint.

Cite this