Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

被引:30
作者
Fu, Yangchun [1 ]
Lin, Zhiqiang [1 ]
机构
[1] Univ Texas Dallas, Richardson, TX 75080 USA
关键词
Security; Management;
D O I
10.1145/2505124
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is generally believed to be a tedious, time-consuming, and error-prone process to develop a virtual machine introspection (VMI) tool because of the semantic gap. Recent advance shows that the semantic-gap can be largely narrowed by reusing the executed code from a trusted OS kernel. However, the limitation for such an approach is that it only reuses the exercised code through a training process, which suffers the code coverage issues. Thus, in this article, we present VMST, a new technique that can seamlessly bridge the semantic gap and automatically generate the VMI tools. The key idea is that, through system wide instruction monitoring, VMST automatically identifies the introspection related data from a secure-VM and online redirects these data accesses to the kernel memory of a product-VM, without any training. VMST offers a number of new features and capabilities. Particularly, it enables an in-VM inspection program (e. g., ps) to automatically become an out-of-VM introspection program. We have tested VMST with over 25 commonly used utilities on top of a number of different OS kernels including Linux and Microsoft Windows. The experimental results show that our technique is general (largely OS-independent), and it introduces 9.3X overhead for Linux utilities and 19.6X overhead for Windows utilities on average for the introspected program compared to the native in-VM execution without data redirection.
引用
收藏
页数:29
相关论文
共 51 条
[1]  
[Anonymous], QEMU AN OPEN SOURCE
[2]  
[Anonymous], 2007, PROCEEDINGS OF THE 1
[3]  
[Anonymous], 2006, P 13 ACM C COMPUTER
[4]  
Bach M. J., 1986, THE DESIGN OF THE UN
[5]  
Bahram S., 2010, PROCEEDINGS OF THE 2
[6]  
Baiardi Fabrizio, 2007, 2007 3rd International Symposium on Information Assurance and Security, P209
[7]  
Bovet D. P., 2005, Understanding The Linux Kernel, V3rd
[8]  
Caballero J, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P317
[9]  
Carbone M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P555
[10]  
Chen P. M., 2001, PROCEEDINGS OF THE 8