期刊文献+

Information Transfer Model of Virtual Machine Based on Storage Covert Channel

Information Transfer Model of Virtual Machine Based on Storage Covert Channel
原文传递
导出
摘要 Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between Guest and virtual machine monitor to pass data directly. The Guest machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode. Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between Guest and virtual machine monitor to pass data directly. The Guest machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期377-384,共8页 武汉大学学报(自然科学英文版)
基金 Supported by the National High Technology Research and Development Program of China (863 Program) (2009AA012200) Henan Province Science and Technology Funding Projects ( SP09JH11158)
关键词 VIRTUALIZATION safety protection information extraction of virtual machine covert channel process control structure virtualization safety protection information extraction of virtual machine covert channel process control structure
  • 相关文献

参考文献19

  • 1Brickell E F, Hall C D, Cihula J F, et al. Method of improv- ing computer security through sandboxing [P]. US: 7908653, 2011-03-15.
  • 2Ashok R K, Jemiolo D E, Kaplinger T E, et al. Secure ac- cess to a virtual machine [P]. US: 13/420, 102, 2012-03-14.
  • 3Tupakula U, Varadharajan V, Bichhawat A. Security archi- tecture for virtual machines [C]//Proc 1 lth Algorithms and architectures for parallel processing. Berlin, Heidelberg: Springer-Verlag, 2011 : 218-229.
  • 4Garber L. The challenges of securing the virtualized envi- ronment [J]. Computer, 2012, 45(1): 17-20.
  • 5Haeberlen A, Aditya P, Rodrigues R, et al. Accountable virtual machines [C]//Proc 9th USENIX Operating systems design and implementation. New York: USENIX Associa- tion, 2010: 58-74.
  • 6Kunk A, Bohman P, Shaw E. VMM based rootkit detection on Android[EB/OL]. [2011-05-10]. http://cs523-sp2011-bjks. googlecode.com/files/cs5 23 final_report.pdf.
  • 7刘谦,王观海,翁楚良,骆源,李明禄.A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security Ⅱ:Implementation[J].China Communications,2011,8(2):86-94. 被引量:5
  • 8Borghei E, Azmi R, Ghahremanian A, et al. Virtual machine based security architecture [C]//Proe World Congress on In- ternet Security. London: IEEE Press, 2011 : 210- 215.
  • 9Nan Z. Virtualization safety problem analysis [C]//Proc 3rd Communication Software and Networks. Xi'an: IEEE Press, 2011: 195-197.
  • 10Semnanian A A, Pham J, Englert B, et al. Virtualization technology and its impact on computer hardware architec- ture [C]//Proc Eighth International Conference on Informa- tion Technology: New Generations. Las Vegas: IEEE Press, 2011: 719-724.

二级参考文献8

  • 1刘谦,王观海,翁楚良,骆源,李明禄.一种虚拟机系统中关于多级安全的强制访问控制框架Ⅰ:理论(英文)[J]中国通信,2010(04).
  • 2LITTY L,LIE D.Manitou: A LayerBelow Approach to Fighting Malware. Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability . 2006
  • 3HIRANO M,SHINAGAWA T,EIRAKU H, et al.Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. Proceedings of IEEE Asia-Pacific Services Computing Conference . 2008
  • 4COKER G.Xen Security Modules (XSM). http://www.xen.org/fi les/xensummit_4/xsm- summit-041707_Coker.pdf . 2010
  • 5Dunlap G W,King S T,Sukru C et al.ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI’02) . 2002
  • 6Reiner Sailer,Trent Jaeger,Enriquillo Valdez,Ramon Caceres,Ronald Perez,Stefan Berger,John Linwood Griffin,Leendert van Doorn.Building a mac-based securityarchitecture for the xen open-source hypervisor. Proceedings of the 2005 Annual Computer Security Applications Conference . 2005
  • 7Barham P,Dragovic B,Fraser K,et al.Xen and the Art of Virtualization. Proceedings of the 19th ACM Symposium on Operating Systems Principles . 2003
  • 8McLean J.The specification and modeling of computer security. Computer . 1990

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部