Bootkits revisited : detecting, analysing and mitigating bootkit threats / von Bernhard Grill
VerfasserGrill, Bernhard
Begutachter / BegutachterinKastner, Wolfgang ; Platzer, Christian
ErschienenWien, 2016
Umfangx, 82 Seiten : Diagramme
HochschulschriftTechnische Universität Wien, Diplomarbeit, 2016
Zusammenfassung in deutscher Sprache
Schlagwörter (EN)Bootkit / malware / infection
URNurn:nbn:at:at-ubtuw:1-101009 Persistent Identifier (URN)
 Das Werk ist frei verfügbar
Bootkits revisited [1.74 mb]
Zusammenfassung (Englisch)

Bootkits (short for boot + rootkit) are one of the most advanced, powerful and persistent threats exploited in sophisticated malware attacks. In order to investigate this attack vector in greater detail, we performed a large-scale bootkit malware analysis utilizing Windows XP and Windows 7. The data set consists of samples spanning a timer period over 8 years to gain detailed insights into the bootkit malware economy. Grounded on the analysis results of 26,378 malware samples, novel techniques to detect and stop bootkit attacks have been developed. The proposed detection techniques are based on anomaly identification utilizing dynamic analysis during the system's boot phase. Furthermore, two novel techniques to prevent bootkit infections have been developed. The first one, is grounded on strictly blocking the malware's initial persistence and infection vector, while the second approach relies on emulation and monitoring the impact of disk modifications targeting the system's boot process. Furthermore, this work showcases the historic evolution of bootkit techniques starting in 2006 and presents an outlook on their potential future evolution.