首页> 外文学位 >Virtualization-Based Approaches for Mitigation of Malware Threats.
【24h】

Virtualization-Based Approaches for Mitigation of Malware Threats.

机译:基于虚拟化的缓解恶意软件威胁的方法。

获取原文
获取原文并翻译 | 示例

摘要

Modern computer systems consist of a number of software layers to provide efficient resource management, secure isolation, and convenient environment for program development and execution. The hypervisor virtualizes multiple instances of hardware for guest operating systems or another layer of hypervisors with strong isolation between the virtualized hardware instances. Running directly on hardware, physical or virtualized, the operating systems (OSs) provide efficient resource management and a convenient set of interface for applications to access the hardware resource including CPU. In addition, the OS regulates each application with virtual memory, user identification, file permissions, etc. such that a non-privileged application cannot interact with other applications or access privileged files without gaining the corresponding permissions. One level above the OS, the runtime libraries and system daemons help applications to communicate with the OS in an easier manner. Each software layer has various software bugs and design flaws such that the secure isolation could be broken through. This motivates our research of securing different software layers with a series of virtualization-based approaches.;In this dissertation, we firstly present an OS-level virtualization system, AirBag, to improve Android architecture in the aspect of malware defense and analysis for dealing with flaws in Android runtime environment. AirBag allows users to "test" untrusted apps in an isolated Android runtime environment without private data leakage, system files corruption, and more severe damages such as sending SMSs to premium numbers. Besides, users can "profile" untrusted apps in the instrumented isolated Android runtime, which improves the capabilities of dynamic analysis. However, such an OS-level approach is vulnerable to attacks that exploit the vulnerabilities inside the OS. When the OS is compromised, all private data such as the bank account and password could be leaked while the amount of an online payment could be changed by the attacker. Since building a bug-free OS is impossible, we present a tiny hypervisor, tHype, to provide trusted IO access to users when they input the sensitive data or perform critical operations. Compared to existing hypervisors, tHype outperforms by its code size since it only virtualizes critical IO on mobile devices, mainly touchscreen and framebuffer. Yet, in general, virtualizing computer systems is complicated such that most existing hypervisors have large code base which make them vulnerable. Even worse, the hosted (or Type-II) hypervisor is considered to include the host OSs in its trusted code base (TCB) that makes it have a wider attack surface compared to bare-metal (or Type-I) hypervisors.We present the DeHype system to reduce the TCB of the hosted hypervisor by deprivileging its execution to user mode. With DeHype, the hypervisor is executed in the context of an user mode process for each guest VM, which prevents a compromised hypervisor from attacking other guests.
机译:现代计算机系统由许多软件层组成,可为程序开发和执行提供有效的资源管理,安全的隔离以及便利的环境。虚拟机监控程序通过虚拟化的硬件实例之间的强大隔离,为来宾操作系统或另一层虚拟机监控程序虚拟化了多个硬件实例。操作系统(OS)直接运行在物理或虚拟化的硬件上,可提供有效的资源管理和一组方便的接口,以供应用程序访问包括CPU在内的硬件资源。此外,操作系统还通过虚拟内存,用户标识,文件许可权等来调节每个应用程序,以使非特权应用程序无法与其他应用程序交互或访问特权文件而不获取相应的许可权。运行时库和系统守护程序在操作系统之上一级,可帮助应用程序以更轻松的方式与操作系统进行通信。每个软件层都有各种软件错误和设计缺陷,因此可以打破安全隔离。这激发了我们通过一系列基于虚拟化的方法来保护不同软件层的研究。本文首先提出了一种OS级虚拟化系统AirBag,以从恶意软件防御和分析方面改善Android体系结构,以应对Android运行时环境中的缺陷。 AirBag允许用户在隔离的Android运行时环境中“测试”不受信任的应用程序,而不会导致私人数据泄漏,系统文件损坏以及更严重的损害,例如将SMS发送给高级号码。此外,用户可以在已检测到的隔离Android运行时中“分析”不受信任的应用程序,从而提高了动态分析的功能。但是,这种操作系统级别的方法很容易受到利用操作系统内部漏洞的攻击。当操作系统受到威胁时,所有私人数据(例如银行帐户和密码)可能会泄露,而攻击者可能会更改在线支付的金额。由于构建无错误的操作系统是不可能的,因此我们提出了一个微型管理程序tHype,当用户输入敏感数据或执行关键操作时,它可以为用户提供受信任的IO访问。与现有的虚拟机管理程序相比,tHype的代码大小胜过,因为它仅虚拟化了移动设备(主要是触摸屏和帧缓冲区)上的关键IO。但是,总的来说,虚拟化计算机系统非常复杂,因此大多数现有的虚拟机管理程序都具有庞大的代码库,这使其很容易受到攻击。更糟糕的是,托管(或II型)虚拟机管理程序被认为在其受信任的代码库(TCB)中包含了主机操作系统,这使其与裸机(或I型)虚拟机管理程序相比具有更广泛的攻击面。 DeHype系统通过将托管虚拟机管理程序的执行权限剥夺到用户模式来减少其托管代码库。使用DeHype,可在每个访客虚拟机的用户模式进程的上下文中执行虚拟机监控程序,这可防止受感染的虚拟机监控程序攻击其他访客。

著录项

  • 作者

    Wu, Chiachih.;

  • 作者单位

    North Carolina State University.;

  • 授予单位 North Carolina State University.;
  • 学科 Computer science.;Computer engineering.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 98 p.
  • 总页数 98
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号