首页> 外文会议>ACM symposium on Operating systems principles >Detecting past and present intrusions through vulnerability-specific predicates
【24h】

Detecting past and present intrusions through vulnerability-specific predicates

机译:通过漏洞特异性谓词检测过去和目前的入侵

获取原文
获取外文期刊封面目录资料

摘要

Most systems contain software with yet-to-be-discovered security vulnerabilities. When a vulnerability is disclosed, administrators face the grim reality that they have been running software which was open to attack. Sites that value availability may be forced to continue running this vulnerable software until the accompanying patch has been tested. Our goal is to improve security by detecting intrusions that occurred before the vulnerability was disclosed and by detecting and responding to intrusions that are attempted after the vulnerability is disclosed. We detect when a vulnerability is triggered by executing vulnerability-specific predicates as the system runs or replays. This paper describes the design, implementation and evaluation of a system that supports the construction and execution of these vulnerability-specific predicates. Our system, called IntroVirt, uses virtual-machine introspection to monitor the execution of application and operating system software. IntroVirt executespredicates over past execution periods by combining virtual-machine introspection with virtual-machine replay. IntroVirt eases the construction of powerful predicates by allowing predicates to run existing target code in the context of the target system, and it uses checkpoints so that predicates can execute target code without perturbing the state of the target system. IntroVirt allows predicates to refresh themselves automatically so they work in the presence of preemptions. We show that vulnerability-specific predicates can be written easily for a wide variety of real vulnerabilities, can detect and respond to intrusions over both the past and present time intervals, and add little overhead for most vulnerabilities.
机译:大多数系统包含具有迄今为止的安全漏洞的软件。披露漏洞时,管理员面临着严峻的现实,以至于它们已经运行了开放攻击的软件。值可用性可能被迫继续运行此易受攻击的软件,直到伴随的修补程序已被测试。我们的目标是通过检测在公开漏洞之前发生并通过检测和响应在公开脆弱性之后尝试的入侵来提高安全性的安全性。当系统运行或重放时,我们检测到何时何时触发漏洞漏洞的谓词。本文介绍了支持这些漏洞特定谓词的构建和执行的系统的设计,实现和评估。我们的系统名为Introvirt,使用虚拟机的内省监视应用程序和操作系统软件的执行。通过使用虚拟机重放的虚拟机进入张平组合虚拟机内省,侦听在过去的执行周期内执行预测。 Introvirt通过允许在目标系统的上下文中运行现有目标代码来减轻强大的谓词的构建,并且它使用检查点,使得谓词可以在不扰乱目标系统的状态而不扰动目标代码。计算机允许谓词自动刷新,以便在抢占的情况下工作。我们展示了特定于漏洞的谓词可以轻松地编写各种真实漏洞,可以通过过去和现在的时间间隔来检测和响应入侵,并为大多数漏洞增加一些开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号