期刊文献+

基于轻量操作系统的虚拟机内省与内存安全监测

Virtual machine introspection and memory security monitoring based on light-weight operating system
下载PDF
导出
摘要 针对在传统特权虚拟机中利用虚拟机内省实时监测其他虚拟机内存安全的方法不利于安全模块与系统其他部分的隔离,且会拖慢虚拟平台的整体性能的问题,提出基于轻量操作系统实现虚拟机内省的安全架构,并提出基于内存完整性度量的内存安全监测方案。通过在轻量客户机中实现内存实时检测与度量,减小了安全模块的可攻击面,降低了对虚拟平台整体性能的影响。通过无干涉的内存度量和自定义的虚拟平台授权策略增强了安全模块的隔离性。基于Xen中的小型操作系统Mini-OS实现了虚拟机内省与内存检测系统原型,评估表明该方案比在特权虚拟机中实现的同等功能减少了92%以上的性能损耗,有效提高了虚拟机内省与实时度量的效率。 The method of utilizing Virtual Machine Introspection (VMI) in a traditional privileged Virtual Machine (VM) to monitor the memory security of other VMs may weaken the isolation between the security module and other parts of the system, and slows down the total performance of the virtualization platform. In order to mitigate these disadvantages, a security architecture based on implementing VMI in a light-weight operating system was proposed, along with a security checking scheme based on memory integrity measurements. By monitoring and checking other VMs' runtime memory in a light-weight VM, the attack surface as well as the performance overhead was reduced. By non-intrusive checking and personalized authentication policy of the virtualization platform, the isolation of the security module was strengthened. A prototype system of VMI and memory detection was implemented based on Mini-OS of Xen. Compared with achieving the same function in privileged VM, the proposed scheme can reduce performance loss by more than 92% . It is proved that the proposed scheme can significantly improve the performance of VMI and reahime checking.
出处 《计算机应用》 CSCD 北大核心 2015年第6期1555-1559,共5页 journal of Computer Applications
基金 中国科学院知识创新工程重要方向性项目(KGCX2-YW-12) 核高基国家重大项目(2014ZX01029101-002)
关键词 虚拟机内省 XEN Mini-OS 内存监控 完整性度量 入侵检测 Virtual Machine Introspection (VMI) Xen Mini Operating System ( Xen Mini-OS) memory monitoring integrity checking intrusion detection
  • 相关文献

参考文献16

  • 1PéK G,BUTTYáN L,BENCSáTH B.A survey of security issues in hardware virtualization[J].ACM Computing Survey,2013,45(3):Article 40.
  • 2CHAWLA S,NIGAM A,DOKE P,et al.A survey of virtualization on mobiles[C]//ACC 2011:Proceedings of the First International Conference on Advances in Computing and Communications,Communications in Computer and Information Science,LNCS 191.Berlin:Springer,2011:430-441.
  • 3PAYNE B D,de CARBONE M D P,LEE W.Secure and flexible monitoring of virtual machines[C]//ACSAC 2007:Proceedings of the Twenty-Third Annual Computer Security Applications Conference.Piscataway:IEEE,2007:385-397.
  • 4PAYNE B D.Simplifying virtual machine introspection using LibVMI,SAND2012-7818[R/OL].[2014-12-01].http://prod.sandia.gov/techlib/access-control.cgi/2012/127818.pdf.
  • 5HIZVER J,CHIUEH T.Real-time deep virtual machine introspection and its applications[C]//VEE 2014:Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments.New York:ACM,2014:3-14.
  • 6XIA Y,LIU Y,CHEN H.Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks[C]//HPCA 2013:Proceedings of the 2013 IEEE 19th International Symposium on High Performance Computer Architecture.Piscataway:IEEE,2013:246-257.
  • 7SHAW A L,BORDBAR B,SAXON J,et al.Forensic virtual machines:dynamic defence in the cloud via introspection[C]//IC2E 2014:Proceedings of the 2014 IEEE International Conference on Cloud Engineering.Piscataway:IEEE,2014:303-310.
  • 8HARRISON K,BORDBAR B,ALI S T T,et al.A framework for detecting malware in cloud by identifying symptoms[C]//EDOC 2012:Proceedings of the 2012 IEEE 16th International Enterprise Distributed Object Computing Conference.Piscataway:IEEE,2012:164-172.
  • 9GUTTMAN B,ROBACK E A.An introduction to computer security:the NIST handbook[R].Gaithersburg:National Institute of Standards and Technology,1995.
  • 10SINGARAVELU L,PU C,HARTIG H,et al.Reducing TCB complexity for security-sensitive applications:Three case studies[J].ACM SIGOPS Operating Systems Review,2006,40(4):161-174.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部