【24h】

Secure In-VM Monitoring Using Hardware Virtualization

机译:使用硬件虚拟化安全In-VM监控

获取原文
获取外文期刊封面目录资料

摘要

Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain higher privilege over these attacks, and isolate security tools from the untrusted guest VM by moving them out and placing them in a separate trusted VM. Although out-of-VM isolation can help ensure security, the added overhead of world-switches between the guest VMs for each invocation of the monitor makes this approach unsuitable for many applications, especially fine-grained monitoring. In this paper, we present Secure In-VM Monitoring (SIM), a general-purpose framework that enables security-monitoring applications to be placed back in the untrusted guest VM for efficiency without sacrificing the security guarantees provided by running them outside of the VM. We utilize contemporary hardware memory protection and hardware virtualization features available in recent processors to create a hypervisor protected address space where a monitor can execute and access data in native speeds and to which execution is transferred in a controlled manner that does not require hypervisor involvement. We have developed a prototype into KVM utilizing Intel VT hardware virtualization technology. We have also developed two representative applications for the Windows OS that monitor system calls and process creations. Our microbenchmarks show at least 10 times performance improvement in invocation of a monitor inside SIM over a monitor residing in another trusted VM. With a systematic security analysis of SIM against a number of possible threats, we show that SIM provides at least the same security guarantees as what can be achieved by out-of-VM monitors.
机译:内核级别攻击或rootkits可以通过使用内核的特权来损害操作系统的安全性。目前的方法使用虚拟化通过将这些攻击更高的特权,并通过将它们移出并将其放入单独的可信VM中,从不受信任的Guest VM中隔离安全工具。虽然VM隔离可以帮助确保安全性,但监视器每次调用的Guest虚拟机之间的世界交换机的增加的开销使得这种方法不适合许多应用,尤其是细粒度的监测。在本文中,我们呈现了安全的VM监控(SIM),一种通用框架,使安全监控应用程序能够放置在不受信任的Guest VM中的效率,而不会牺牲通过在VM之外运行它们提供的安全保证。我们利用当代硬件存储器保护和最近的处理器中提供的硬件虚拟化功能,以创建一个虚拟机管理程序保护的地址空间,其中监视器可以在本机速度中执行和访问数据,并以受控方式传输不需要虚拟机管理程序的方式。我们开发了利用英特尔VT硬件虚拟化技术的KVM原型。我们还为监视系统调用和进程创建的Windows操作系统开发了两个代表性应用程序。我们的MicroBenchmarks在驻留在另一个可信VM中的监视器上,至少会在SIM的监视器中调用监视器的性能提高至少10倍。通过对许多可能的威胁进行SIM的系统安全分析,我们表明SIM至少提供了相同的安全保证,因为VM超出VM监视器可以实现的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号