首页> 外文学位 >Using Hardware Isolated Execution Environments for Securing Systems.
【24h】

Using Hardware Isolated Execution Environments for Securing Systems.

机译:使用硬件隔离的执行环境来保护系统。

获取原文
获取原文并翻译 | 示例

摘要

With the rapid proliferation of malware attacks on the Internet, malware detection and analysis play a critical role in crafting effective defenses. Advanced malware detection and analysis rely on virtualization and emulation technologies to introspect the malware in an isolated environment and analyze malicious activities by instrumenting code execution. Virtual Machine Introspection (VMI) systems have been widely adopted for malware detection and analysis. VMI systems use hypervisor technology to create an isolated execution environment for system introspection and to expose malicious activity. However, recent malware can detect the presence of virtualization or corrupt the hypervisor state and thus avoid detection and debugging.;In this thesis, I developed several systems using hardware isolated execution environments for attack detection, malware debugging, and sensitive operations. My research approach combines 1) the isolated execution concept with 2) hardware-assisted technologies. It leverages System Management Mode (SMM), a CPU mode in the x86 architecture, to transparently detect and debug armored malware and perform sensitive workloads. This research uses SMM to secure systems with a minimal Trust Computing Base (TCB) and low performance overhead. In addition, I develop a BIOS-assisted isolation environment that is capable of running a secure commodity OS.;To demonstrate the effectiveness of my research, several prototypes of using SMM as the isolated execution environment are implemented. First, I use SMM to introspect all layers of system software, including applications, OSes, hypervisors, and firmware. Secondly, my research leverages SMM to transparently debug armored malware and achieve a higher level of transparency than state-of-the-art systems. Lastly, this thesis uses SMM to securely perform password-logins without trusting the operating system and prevents ring 0 keyloggers.
机译:随着Internet上恶意软件攻击的迅速扩散,恶意软件检测和分析在制定有效的防御措施中起着至关重要的作用。高级恶意软件检测和分析依靠虚拟化和仿真技术来在隔离的环境中对恶意软件进行内部检查,并通过检测代码执行来分析恶意活动。虚拟机自检(VMI)系统已被广泛用于恶意软件检测和分析。 VMI系统使用虚拟机监控程序技术来创建隔离的执行环境以进行系统自省并公开恶意活动。但是,最近的恶意软件可以检测到虚拟化的存在或破坏虚拟机监控程序的状态,从而避免了检测和调试。;本文中,我开发了使用硬件隔离执行环境的多个系统,用于攻击检测,恶意软件调试和敏感操作。我的研究方法将1)孤立执行概念与2)硬件辅助技术结合在一起。它利用x86架构中的CPU模式系统管理模式(SMM)透明地检测和调试装甲的恶意软件并执行敏感的工作负载。这项研究使用SMM以最小的信任计算库(TCB)和低性能开销保护系统安全。此外,我还开发了一种BIOS辅助的隔离环境,该环境能够运行安全的商品OS。为了证明我的研究的有效性,实现了一些使用SMM作为隔离执行环境的原型。首先,我使用SMM自检系统软件的所有层,包括应用程序,操作系统,虚拟机管理程序和固件。其次,我的研究利用SMM来透明地调试装甲的恶意软件,并实现比最新系统更高的透明度。最后,本文使用SMM在不信任操作系统的情况下安全地执行密码登录,并阻止了Ring 0键盘记录程序。

著录项

  • 作者

    Zhang, Fengwei.;

  • 作者单位

    George Mason University.;

  • 授予单位 George Mason University.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 148 p.
  • 总页数 148
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号