Rootkit Detection on Embedded IoT Devices

Keywords: embedded systems, Internet of Things, security, malware

Abstract

IoT systems are subject to cyber attacks, including infecting embedded IoT devices with rootkits. Rootkits are malicious software that typically run with elevated privileges, which makes their detection challenging. In this paper, we address this challenge: we propose a rootkit detection approach for embedded IoT devices that takes advantage of a trusted execution environment (TEE), which is often supported on popular IoT platforms, such as ARM based embedded boards. The TEE provides an isolated environment for our rootkit detection algorithms, and prevents the rootkit from interfering with their execution even if the rootkit has root privileges on the untrusted part of the IoT device. Our rootkit detection algorithms identify modifications made by the rootkit to the code of the operating system kernel, to system programs, and to data influencing the control flow (e.g., hooking system calls), as well as inconsistencies created by the rootkit in certain kernel data structures (e.g., those responsible to handle process related information). We also propose algorithms to detect rootkit components in the persistent storage of the device. Besides describing our approach and algorithms in details, we also report on a prototype implementation and on the evaluation of our design and implementation, which is based on testing our prototype with rootkits that we developed for this purpose.

Downloads

Download data is not yet available.
Published
2021-08-04
How to Cite
Nagy, R., Németh, K., Papp, D., & Buttyán, L. (2021). Rootkit Detection on Embedded IoT Devices. Acta Cybernetica, 25(2), 369-400. https://doi.org/10.14232/actacyb.288834
Section
Special Issue of the 12th Conference of PhD Students in Computer Science