Kernel rootkits detection method by monitoring branches using hardware features

Toshihiro Yamauchi, Yohei Akao

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)


An operating system is an essential piece of software that manages hardware and software resources. Thus, attacks on an operating system kernel using kernel rootkits pose a particularly serious threat. Detecting an attack is difficult when the operating system kernel is infected with a kernel rootkit. For this reason, handling an attack will be delayed causing an increase in the amount of damage done to a computer system. In this paper, we propose Kernel Rootkits Guard (KRGuard), which is a new method to detect kernel rootkits that monitors branch records in the kernel space. Since many kernel rootkits make branches that differ from the usual branches in the kernel space, KRGuard can detect these differences by using the hardware features of commodity processors. Our evaluation shows that KRGuard can detect kernel rootkits that involve new branches in the system call handler processing with small overhead.

Original languageEnglish
Pages (from-to)2377-2381
Number of pages5
JournalIEICE Transactions on Information and Systems
Issue number10
Publication statusPublished - Oct 2017


  • Kernel rootkit detection
  • Last branch record
  • Operating system
  • System security

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence


Dive into the research topics of 'Kernel rootkits detection method by monitoring branches using hardware features'. Together they form a unique fingerprint.

Cite this