首页> 外文学位 >Understanding and Leveraging Virtualization Technology for Computer Security.
【24h】

Understanding and Leveraging Virtualization Technology for Computer Security.

机译:了解和利用虚拟化技术实现计算机安全。

获取原文
获取原文并翻译 | 示例

摘要

As virtualization technology has been widely used in the computing world, understanding its security properties and implications has become essential for leveraging it for security research. This dissertation studies virtualization technology from three aspects. First, we investigate the memory sharing mechanism used in current mainstream virtual machine monitors, and reveal its security implications; second, we study a reverse information retrieval problem in virtualized environments; third, we attempt to improve the virtual machine introspection technique, in particular, we propose to use user-level invariants, rather than kernel level information, to reconstruct key data structures of the guest OS.;Memory sharing, also named memory deduplication, has been widely used in various commodity hypervisors. While this technique improves memory efficiency, it has a large impact on system security. We investigate the security implication of memory deduplication from the perspectives of both attackers and defenders.;Virtual machine extrospection (VME), which we define as a procedure to retrieve hypervisor information from within a guest OS, is an open problem and has not yet been comprehensively studied before. In this dissertation, we take the initiative and study this reverse information retrieval problem. In particular, we investigate how to determine the host OS kernel version from within a guest OS. Building on our detection of hypervisor features and bugs, we present a novel framework called Hyperprobe that for the first time enables users in a guest OS to automatically detect the underlying host OS kernel version in a few minutes. We implement a prototype of Hyperprobe and evaluate its effectiveness in five real world clouds, as well as in a controlled testbed environment, all yielding promising results.;Virtual machine introspection (VMI) is an approach to inspecting and analyzing the software running inside a virtual machine from the hypervisor. The existing VMI tools rely on up-to-date kernel information of the target operating system (OS) to work properly, and this requirement prevents these tools from being widely deployed in real cloud environments. In this dissertation, we present a VMI tool called HyperLink that partially retrieves running process and module related information inside a virtual machine without source code. While current introspection solutions support only one or a limited number of kernel versions of the target OS, HyperLink is the first one-for-all introspection tool. We validate the efficacy of HyperLink under different versions of Linux, Windows, FreeBSD, and Mac OS X. We demonstrate that HyperLink can help users detect real-world kernel rootkits and play an important role in intrusion detection. Due to its version-agnostic property, HyperLink could become the first introspection and forensic tool that works well in cloud environments.
机译:由于虚拟化技术已在计算领域广泛使用,因此了解其安全性和含义对于将其用于安全性研究变得至关重要。本文从三个方面研究虚拟化技术。首先,我们研究当前主流虚拟机监视器中使用的内存共享机制,并揭示其安全性。其次,研究虚拟化环境中的反向信息检索问题。第三,我们尝试改进虚拟机自省技术,特别是,我们建议使用用户级不变式而不是内核级信息来重建来宾OS的关键数据结构。内存共享(也称为内存重复数据删除)具有被广泛用于各种商品管理程序中。尽管此技术提高了内存效率,但对系统安全性有很大影响。我们从攻击者和防御者的角度研究了内存重复数据删除的安全隐患。虚拟机自检(VME)(我们定义为从来宾OS内检索虚拟机管理程序信息的过程)是一个开放问题,并且尚未解决。之前全面研究过。本文以主动性为出发点,研究了反向信息检索问题。特别是,我们研究了如何从来宾OS中确定主机OS内核版本。在检测到虚拟机监控程序功能和错误的基础上,我们提出了一个名为Hyperprobe的新颖框架,该框架首次使来宾OS中的用户能够在几分钟内自动检测底层主机OS内核版本。我们实现了Hyperprobe的原型,并在五个真实世界的云以及受控的测试平台环境中评估了其有效性,均产生了令人鼓舞的结果;虚拟机自省(VMI)是一种检查和分析在虚拟机中运行的软件的方法管理程序中的计算机。现有的VMI工具依靠目标操作系统(OS)的最新内核信息来正常工作,并且此要求阻止了这些工具在实际的云环境中广泛部署。在本文中,我们提出了一个名为HyperLink的VMI工具,该工具可以部分地检索虚拟机中运行过程和模块的相关信息,而无需源代码。尽管当前的自省解决方案仅支持目标操作系统的一个或有限数量的内核版本,但HyperLink是第一个针对所有人的自省工具。我们验证了HyperLink在Linux,Windows,FreeBSD和Mac OS X的不同版本下的功效。我们证明了HyperLink可以帮助用户检测现实世界的内核rootkit,并在入侵检测中发挥重要作用。由于其与版本无关的特性,HyperLink可能成为第一个在云环境中运行良好的自省和取证工具。

著录项

  • 作者

    Xiao, Jidong.;

  • 作者单位

    The College of William and Mary.;

  • 授予单位 The College of William and Mary.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2016
  • 页码 114 p.
  • 总页数 114
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号