<html>
<head>
  <meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
  <meta name="author" content="Daisuke Shimamoto" />
  <meta name="keywords" content="security, windows, kernel, sysenter, system service, programming" />
  <meta name="description" content="Daisuke Shimamoto's page on his studies at univeristy." />
  <meta name="robots" content="all" />
  <title>Current Studies</title>
  <link rel="stylesheet" style="css/text" href="main.css" />
</head>

<body>

<h1>Daisuke Shimamoto
@ <a href="http://www.yl.is.s.u-tokyo.ac.jp/">Yonezawa Lab</a></h1>
<div id="menubar">
  <div id="menutop"><a href="/~disk-ec7/">Top</a></div>
  <div id="menugt"><a href="g_thesis.html">Graduation Thesis</a></div>
  <div id="menumt"><a href="studies.html">Master Thesis</a></div>
  <div id="menulnk"><a href="links.html">Links</a></div>
</div>

<h2>Current Studies</h2>
<div class="t1">
I currently work on <span style="color:red;">security for Windows</span>.<br />
</div>

<div class="st">My Work in Detail</div>
<div class="t1">
  <p>There are various kinds of security related works. Our goal is to create a
    novel IDS which uses the state of the process to distinguish intrusions or 
    malicious actions. Though there are many security related softwares such
    as anti-viruses, firewalls, IDS and so on, most of them have predefined
    signatures, created by the vendor, which are compared with the
    suspicious program or data (e.g. network packets, files). The vendors of
    these softwares work their socks off to catch up with the endless
    "tsunami" of new viruses and attacks.</p>
  <p>Our work is to create a system which will not use simple byte-to-byte
    matching of predefined signatures. Instead it uses the traces
    of the process for detection. To be more precise, our system will
    use the NT System Service traces to distinguish between normal and
    abnormal behaviours.
    An NT System Service corresponds to a system call on UNIX and UNIX
    compatible operating systems (e.g. Linux, BSD).</p>
  <p>The NT System Service is explained in more detail
  <a href="ntsystemservice.html">here</a>.</p>
  <p>The basic idea of using system calls for intrusion detections is not
    new and has been around for quite long in the UNIX world. Operating
    systems such as Linux or BSD have an open-source kernel and thus the
    internals are well-known. This lead to many works on system call based IDS.
    On the other hand Microsoft does not want programmers to be able
    to look inside their softwares (which is nothing special for commercial
    software vendors) and thus it is difficult for the same kind of
    work to be done. </p>
  <p>Our work is still under development and currently, the software is
    capable of capturing the NT System Service traces.</p>
  <p>There are several ways to implement this feature.
    One is to intercept the switch from user mode to kernel mode (by modifying
    the Interruption Descriptor Table (IDT) or the SYSENTER_EIP_MSR for
    SYSENTER). The second is rewriting the table which keeps
    the address of the NT System Services (which is called the System
    Service Descriptor Table (SSDT)). The last is to modify each
    NT System Services by rewriting the binary code itself.</p>
  <p>We use the first approach which is to overwrite the
    SYSENTER_MIP_MSR. This register indicates the address to jump to when
    executing SYSENTER. The address will be changed to our code which will
    keep track of the NT System Service called by the target process.</p>
  <p>For more detail, please read my
    <a href="docs/graduation_thesis.pdf">graduation thesis(English)</a>.</p>
</div>

<div class="st">Papers</div>
<ul class="unnumbered">
  <li>SACSIS 2006 <a class="ppt" href="docs/sacsis2006.pdf">PDF</a> (Japanese)</li>
</ul>

<div class="st">Talks</div>
<div class="t1">
  <p>The below are slides which I've created for my talk (in Japanese, sorry).
    </p>
<ul class="numbered">
  <li>Yonezawa Lab. Meeting 28th March 2005
  <a class="ppt" href="docs/zentai_050328.ppt">PPT</a>
  <a class="ppt" href="docs/zentai_050328.pdf">PDF</a>
  </li>
  <li>Yonezawa Lab. Meeting 18th October 2005
  <a class="ppt" href="docs/zentai_051018.ppt">PPT</a>
  <a class="ppt" href="docs/zentai_051018.pdf">PDF</a>
  </li>
  <li>Yonezawa Lab. Meeting 24th October 2006
    <a class="ppt" href="docs/zentai_061024.html">HTML(S5)</a>
  </li>
  <li>SIGSS Meeting 16th November 2006
    <a class="ppt" href="docs/sigss_061116.html">HTML(S5)</a>
  </li>
  <li>Yonezawa Lab. Meeting 22nd December 2006
    <a class="ppt" href="docs/zentai_061222.html">HTML(S5)</a>
  </li>
  
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
<script type="text/javascript">
_uacct = "UA-604248-1";
urchinTracker();
</script>
</body>
</html>
