首页> 外文会议>International Conference on Computer Communication and Networks >Process Behavior Monitoring via API Hooking Using Virtualization
【24h】

Process Behavior Monitoring via API Hooking Using Virtualization

机译:通过API使用虚拟化进行处理行为监控

获取原文

摘要

Malwares appear and spread so quickly due to the development of Internet. Information systems are mostly threatened by information stealing and destroying attacks launched by malwares. Now it is difficult to detect malwares by traditional security tools based on signature due to their metamorphosis. To protect users' data, the behaviors of running processes should be monitored. Traditional host-based security solutions, relying on operating system kernel, are vulnerable to be detected, and manipulated by malwares. The solutions outside of the protected VM based on virtualization technologies are advocated for avoiding the detection and manipulation from malwares. However, they can only monitor system call, but not application-level API. API call tracing is a powerful technique for regulating and monitoring program behaviors. In this paper, we propose a novel approach that can enable security tools to trace API call. We present an architecture which can hook APIs in dynamic libraries without preinstalling tools in the guest VM. We utilize virtual machine monitor (VMM) to enforce isolation between guest VM and security tools. We leverage hardware virtualization and Extended Page Tables (EPT) features to provide memory protection for hooks and keep transparency for guest VM. We implement a prototype on Xen to demonstrate the feasibility of the approach. We also develop representative applications for the Windows OS that monitor API calls. The evaluations show our prototype is effective and bring acceptable overhead.
机译:由于互联网的发展,恶魔们出现并迅速传播。信息系统主要受到信息窃取和破坏恶意发起的攻击的威胁。现在,由于其变态,难以根据传统安全工具检测恶意。要保护用户数据,应监控运行进程的行为。依赖于操作系统内核的传统基于主机的安全解决方案易受检测到的,并由恶意恶魔操纵。主张基于虚拟化技术的受保护VM之外的解决方案被提倡避免从恶意恶魔中的检测和操作。但是,它们只能监控系统调用,但不是应用程序级API。 API呼叫跟踪是一种用于调节和监控程序行为的强大技术。在本文中,我们提出了一种新的方法,可以使安全工具能够跟踪API呼叫。我们介绍了一个可以在无需预安装工具的动态库中挂钩API的架构。我们利用虚拟机监视器(VMM)来强制访问Guest VM和安全工具之间的隔离。我们利用硬件虚拟化和扩展页面表(EPT)功能来为挂钩提供内存保护,并为Guest VM保留透明度。我们在Xen实施原型以证明该方法的可行性。我们还为监视API调用的Windows操作系统开发代表性应用程序。评估显示我们的原型是有效的,并带来可接受的开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号