首页> 外文期刊>IEEE transactions on information forensics and security >Detecting Hardware-Assisted Virtualization With Inconspicuous Features
【24h】

Detecting Hardware-Assisted Virtualization With Inconspicuous Features

机译:用不起眼的功能检测硬件辅助虚拟化

获取原文
获取原文并翻译 | 示例
           

摘要

Recent years have witnessed the proliferation of the deployment of virtualization techniques. Virtualization is designed to be transparent, that is, unprivileged users should not be able to detect whether a system is virtualized. Such detection can result in serious security threats such as evading virtual machine (VM)-based malware dynamic analysis and exploiting vulnerabilities for cross-VM attacks. The traditional software-based virtualization leaves numerous artifacts/fingerprints, which can be exploited without much effort to detect the virtualization. In contrast, current mainstream hardware-assisted virtualization significantly enhances the virtualization transparency, making itself more transparent and difficult to be detected. Nonetheless, we showcase three new identified low-level inconspicuous features, which can be leveraged by an unprivileged adversary to effectively and stealthily detect the hardware-assisted virtualization. All three features come from the chipset fingerprints, rather than the traces of software-based virtualization implementations (e.g., Xen or KVM). The identified features include i) Translation-Lookaside Buffer (TLB) stores an extra layer of address translations; ii) Last-Level Cache (LLC) caches one more layer of page-table entries; and iii) Level-1 Data (L1D) Cache is unstable. Based on the above features, we develop three corresponding virtualization detection techniques, which are then comprehensively evaluated on three native environments and three popular cloud providers: i) Amazon Elastic Compute Cloud, ii) Google Compute Engine and iii) Microsoft Azure. Experimental results validate that these three adversarial detection techniques are effective (with no false positive) and stealthy (without triggering suspicious system events, e.g., VM-exit) in detecting the above commodity virtualized environments.
机译:近年来见证了虚拟化技术部署的扩散。虚拟化旨在是透明的,即非特权的用户不应该检测系统是否虚拟化。这种检测可能导致严重的安全威胁,例如逃避虚拟机(VM)的恶意软件动态分析和利用跨VM攻击的漏洞。传统的基于软件的虚拟化留下了许多伪像/指纹,可以在不努力检测虚拟化的情况下被利用。相比之下,当前的主流硬件辅助虚拟化显着提高了虚拟化透明度,使其自身更透明且难以检测到。尽管如此,我们展示了三个新的识别的低级不起眼的特征,可以通过一个非特权的对手来利用<斜体XMLNS:mml =“http://www.w3.org/1998/math/mathml”xmlns:xlink =“http://www.w3.org/1999/xlink”>有效地 steallyily 检测硬件辅助虚拟化。所有三个功能来自芯片组指纹,而不是基于软件的虚拟化实现的迹线(例如,Xen或KVM)。所识别的特征包括i)翻译-ceplaside缓冲区(TLB)存储额外的地址翻译; ii)最后一级缓存(LLC)缓存一层页表条目;和III)Level-1数据(L1D)缓存是不稳定的。基于上述功能,我们开发了三种相应的虚拟化检测技术,然后在三个本机环境和三个流行的云提供商上综合评估:i)亚马逊弹性计算云,ii)Google Compute引擎和III)Microsoft Azure。实验结果验证,这三种对抗性检测技术是有效的(没有假阳性)和隐身(没有触发可疑系统事件,例如,<斜体xmlns:mml =“http://www.w3.org/1998/math/mathml”xmlns:xlink =“http://www.w3.org/1999/xlink”> VM-exit )检测上述商品虚拟化环境。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号