首页> 外文会议>International Symposium on Parallel and Distributed Computing >VE-VMI: High-Performance Virtual Machine Introspection Based on Virtualization Exception
【24h】

VE-VMI: High-Performance Virtual Machine Introspection Based on Virtualization Exception

机译:VE-VMI:基于虚拟化异常的高性能虚拟机进入

获取原文

摘要

Virtual machine introspection (VMI) mostly relies on memory virtualization mechanisms to enforce access restrictions on certain areas of the virtual machine (VM)’s physical memory, including the page tables managed by the guest OS. Consequently, the CPU will generate exceptions on any in-VM memory access not complying with the restrictions imposed by the VMI, switching from the VM to the hypervisor (HV) (in a so-called “VM-exit”), giving the VMI module the possibility to analyze the faulty memory access and take the needed decision to protect the VM. Such a protection strategy could suffer significant performance penalties, as a large number of VM-exits could be generated, though most of them being irrelevant to VMI, like changes of accessed or dirty bits made by the hardware page-table walker. We propose an approach to consistently reduce the number of irrelevant memory-related VM-exits: by using the Intel virtualization exception (#VE) extension, the faulty memory accesses can be handled directly inside the VM, filtering out the ones irrelevant for the VMI, while calling the HV (i.e. generate VM-exits) only for the remaining ones. The in-guest filtering agent is protected against attacks from a compromised VM, by isolating it inside a separate guest physical address space, different by and inaccessible from the one used by the VM while running its own code. We implemented our #VE-based solution in the Xen hypervisor, obtaining performance improvements between 30% and 80% for the applications protected by our VE-VMI module.
机译:虚拟机进入(VMI)主要依赖于内存虚拟化机制来强制在虚拟机(VM)物理内存的某些区域上的访问限制,包括由客户操作系统管理的页面表。因此,CPU将在不符合VMI施加的限制,从VM切换到虚拟机管理程序(HV)(在所谓的“VM-exit”)上生成异常,从而生成不符合VM的限制(在所谓的“VM-exit”中),给出VMI模块可以分析故障内存访问权限,并采取所需的决定来保护VM。这种保护策略可能会遭受重大的性能惩罚,因为可以生成大量VM-退出,尽管大多数都与VMI无关,例如硬件页面Walker所访问的访问或脏位的变化。我们提出了一种方法来始终如一地减少无关内存相关的VM-退出的数量:通过使用英特尔虚拟化异常(#ve)扩展,可以直接在VM内直接处理故障的内存访问,过滤为VMI无关的内存访问,同时仅为剩余的HV(即生成VM-exits)。通过在单独的客户物理地址空间内隔离,在运行自己的代码时,通过在单独的客户物理地址空间中隔离和无法访问,保护in-Guest过滤代理免受受损VM的攻击。我们在Xen管理程序中实现了基于#的基于模式的解决方案,获得了由我们VE-VMI模块保护的应用程序的30%和80%的性能提升。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号