Paper
1 May 2017 Rootkits and the OS friendly microprocessor architecture
Patrick Jungwirth, Thomas Barnett Jr., Abdel-Hameed Badawy
Author Affiliations +
Abstract
We examine how the hardware level security features in the OS Friendly Microprocessor Architecture improves cybersecurity against a rootkit attack. A rootkit (root + kit) is a malicious program or tool -“kit” of programs designed to obtain “root” level privileges (root for Unix, admin for Windows). Rootkits operate at the same security ring level as an operating system. This gives rootkits access to kernel level data structures. Even with state-of-the-art security technologies, it is very difficult to detect a rootkit. Rootkits have been used for digital rights management and copy protection; however, the 2005 CD copy protection scandal illustrates how poor computer security can leave an open door for other malware. We present a security model of the OS Friendly Microprocessor Architecture and we present a short introduction to rootkits. For this paper, we will focus on OS-kernel level rootkits. We will illustrate how the hardware security features of the OS Friendly Microprocessor Architecture increases the difficulty for rootkit malware to compromise a computer system.
© (2017) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Patrick Jungwirth, Thomas Barnett Jr., and Abdel-Hameed Badawy "Rootkits and the OS friendly microprocessor architecture", Proc. SPIE 10185, Cyber Sensing 2017, 1018503 (1 May 2017); https://doi.org/10.1117/12.2258235
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Operating systems

Computing systems

Computer architecture

Defense and security

Network security

Information technology

RELATED CONTENT

Quantification of moving target cyber defenses
Proceedings of SPIE (May 23 2015)
SELinux-based operating system security research
Proceedings of SPIE (August 23 2023)
A physics‐based strategy for cyber resilience of CPS
Proceedings of SPIE (May 02 2019)
Cyber defense through hardware security
Proceedings of SPIE (May 09 2018)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)

Back to Top