System-level support for intrusion recovery

6Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recovering from attacks is hard and gets harder as the time between the initial infection and its detection increases. Which files did the attackers modify? Did any of user data depend on malicious inputs? Can I still trust my own documents or binaries? When malcode has been active for some time and its actions are mixed with those of benign applications, these questions are impossible to answer on current systems. In this paper, we describe DiskDuster, an attack analysis and recovery system capable of recovering from complicated attacks in a semi-automated manner. DiskDuster traces malcode at byte-level granularity both in memory and on disk in a modified version of QEMU. Using taint analysis, DiskDuster also tracks all bytes written by the malcode, to provide a detailed view on what (bytes in) files derive from malicious data. Next, it uses this information to remove malicious actions at recovery time. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Bacs, A., Vermeulen, R., Slowinska, A., & Bos, H. (2013). System-level support for intrusion recovery. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7591 LNCS, pp. 144–163). Springer Verlag. https://doi.org/10.1007/978-3-642-37300-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free