jdk8 / Hypro

VMI on BitVisor to detect hidden rootkits.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Hypro - VMI on BitVisor to detect hidden rootkits.

tools/adore-ng is a well-known LKM(loadable kernel modules) rootkit for getting root privilege, hiding certain processes, files, ports, .etc.
tools/hypercall has the files to read VM's processes, loaded kernel modules, physical memory from VMM, so we can check the differences to find exceptions.
core/vmmcall_vmi.c implements the core VMI functions.
VMI/fs is a ported EXT4 file system from Uboot. With this module, we can reread block device to check to hidden files.
Guest's Fs/(attacked)    VMI/fs
  |_______________________|
  |
driver
  |
hardware
BitVisor uses parapass-through architecture that allows VM's device driver to handle the real device. So VMI/fs is ported to host's OS.

New features(such as capture of memory event and register event) are under developement.

How to build:
Hypro's build can be found in BitVisor's HomePage.

About

VMI on BitVisor to detect hidden rootkits.


Languages

Language:C 80.1%Language:Perl 6.8%Language:Makefile 4.0%Language:C++ 3.2%Language:Assembly 2.2%Language:DIGITAL Command Language 1.6%Language:Shell 0.7%Language:M4 0.3%Language:Batchfile 0.3%Language:Groff 0.2%Language:Objective-C 0.2%Language:Prolog 0.2%Language:Perl 6 0.1%Language:eC 0.0%Language:XS 0.0%Language:Scheme 0.0%Language:Protocol Buffer 0.0%Language:Emacs Lisp 0.0%Language:HTML 0.0%