...
首页> 外文期刊>Journal in computer virology >Enforcing kernel constraints by hardware-assisted virtualization
【24h】

Enforcing kernel constraints by hardware-assisted virtualization

机译:通过硬件辅助虚拟化加强内核约束

获取原文
获取原文并翻译 | 示例
           

摘要

This article deals with kernel security protection. We propose a characterization of malicious kernel-targeted actions, based on how the way they act to corrupt the kernel. Then, we discuss security measures able to counter such attacks. We finally expose our approach based on hardware-virtualization that is partially implemented into our demonstrator Hytux, which is inspired from bluepill (Rutkowska in subverting vista kernel for fun and profit. In: Black Hat in Las Vegas, 2006), a malware that installs itself as a lightweight hypervisor—on a hardware-virtualization compliant CPU—and puts a running Microsoft Windows Operating System into a virtual machine. However, in contrast with bluepill, Hytux is a lightweight hypervisor that implements protection mechanisms in a more privileged mode than the Linux kernel.
机译:本文讨论内核安全保护。我们根据恶意程序针对内核的行为如何破坏内核的行为来提出特征。然后,我们讨论能够抵抗此类攻击的安全措施。最后,我们展示了基于硬件虚拟化的方法,该方法已部分实现到演示器Hytux中,该方法受到bluepill的启发(Rutkowska颠覆vista内核以获取乐趣和利润。在:2006年,拉斯维加斯,黑帽)它本身是一个轻量级的虚拟机管理程序(在符合硬件虚拟化的CPU上),并将正在运行的Microsoft Windows操作系统放入虚拟机中。但是,与bluepill相比,Hytux是一种轻量级的管理程序,它以比Linux内核更高的特权模式实现保护机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号