Lares: An architecture for secure active monitoring using virtualization

被引:178
作者
Payne, Bryan D. [1 ]
Carbone, Martim [1 ]
Sharif, Monirul [1 ]
Lee, Wenke [1 ]
机构
[1] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
来源
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 2008年
关键词
D O I
10.1109/SP.2008.24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today's computers. Malware is often designed to immediately disable any security tools upon installation, rendering them useless. While current research has focused on moving these vulnerable security tools into an isolated virtual machine, this approach cripples security tools by preventing them from doing active monitoring. This paper describes an architecture that takes a hybrid approach, giving security tools the ability to do active monitoring while still benefiting from the increased security of an isolated virtual machine. We discuss the architecture and a prototype implementation that can process hooks from a virtual machine running Windows XP on Xen. We conclude with a security analysis and show the performance of a single hook to be 28 mu secs in the best case.
引用
收藏
页码:233 / 247
页数:15
相关论文
共 40 条
[1]  
Abadi M., 2005, P ACM C COMP COMM SE
[2]  
*ADV MICR DEV, 2007, AMD64 ARCH PROGR MAN, V2
[3]  
[Anonymous], P IEEE S RES SEC PRI
[4]  
[Anonymous], P USENIX ANN TECHN C
[5]  
[Anonymous], 2003, P NETW DISTR SYST SE
[6]  
[Anonymous], 2005, Rootkits: Subverting the Windows Kernel
[7]  
[Anonymous], P 12 USENIX SEC S
[8]  
ARBAUGH WA, 1997, P IEEE S COMP SEC PR
[9]  
Bellard Fabrice, 2005, P 2005 USENIX ANN TE
[10]  
COKER G, 2007 XEN SUMM