Techniques are disclosed for detecting manipulations of user-kernel
transition registers (such as the SYSENTER/SYSCALL critical registers of
Intel/AMD processors, respectively), and other such registers. In one
embodiment, a register monitor agent is deployed at system boot-up, and
continues monitoring target registers for manipulation during system use.
If a manipulation is detected, then exclusions are checked to see if that
manipulation is legitimate (e.g., caused by a trusted source). If not a
legitimate manipulation, then reporting and/or corrective action can be
taken. The techniques can be used in real-time and in any number of
behavior blocking, antivirus, and/or intrusion prevention applications.