首页> 外文期刊>Programming and Computer Software >A lightweight method for virtual machine introspection
【24h】

A lightweight method for virtual machine introspection

机译:虚拟机自检的轻量级方法

获取原文
获取原文并翻译 | 示例

摘要

A method for the introspection of virtual machines is proposed. The main distinctive feature of this method is that it makes it possible to obtain information about the system operation using the minimum knowledge about its internal organization. The proposed approach uses rarely changing parts of the application binary interface, such as identifiers and parameters of system calls, calling conventions, and the formats of executable files. The lightweight property of the introspection method is due to the minimization of the knowledge about the system and by its high performance. The introspection infrastructure is based on the QEMU emulator, version 2.8. Presently, monitoring the file operations, processes, and API function calls are implemented. The available introspection tools (RTKDSM, Panda, and DECAF) get data for the analysis using kernel structures. All the data obtained (addresses of structures, etc.) is written to special profiles. Since the addresses and offsets strongly depend not only on the version of the operating system but also on the parameters of its assembly, these tools have to store a large number of profiles. We propose to use parts of the application binary interface because they are rarely modified and it is often possible to use one profile for a family of OSs. The main idea underlying the proposed method is to intercept the system and library function calls and read parameters and returned values. The processor provides special instructions for calling system and user defined functions. The capabilities of QEMU are extended by an instrumentation mechanism to enable one to track each executed instruction and find the instructions of interest among them. When a system call occurs, the control is passed to the system call detector that checks the number of the call and decides to which module the job should be forwarded. In the case of an API function call, the situation is similar, but the API function detector checks the function address. An introspection tool consisting of a set of modules is developed. These modules are dynamic libraries that are plugged in QEMU. The modules can interact by exchanging data.
机译:提出了一种虚拟机内省的方法。该方法的主要特点是,它可以使用有关内部组织的最少知识来获取有关系统操作的信息。提出的方法使用应用程序二进制接口的很少更改的部分,例如系统调用的标识符和参数,调用约定以及可执行文件的格式。自省方法的轻量级特性是由于对系统知识的最小化及其高性能。自检基础结构基于QEMU模拟器2.8版。当前,实现了监视文件操作,过程和API函数调用。可用的自省工具(RTKDSM,Panda和DECAF)使用内核结构获取用于分析的数据。所有获得的数据(结构的地址等)都将写入特殊配置文件。由于地址和偏移量不仅取决于操作系统的版本,而且还取决于其组装的参数,因此这些工具必须存储大量的配置文件。我们建议使用应用程序二进制接口的某些部分,因为它们很少被修改,并且对于一个操作系统系列通常可以使用一个配置文件。提出的方法的主要思想是拦截系统和库函数调用,并读取参数和返回值。处理器提供了用于调用系统和用户定义功能的特殊指令。 QEMU的功能通过一种检测机制进行了扩展,以使人们能够跟踪每条执行的指令并在其中找到感兴趣的指令。发生系统调用时,控制权将传递给系统调用检测器,该系统调用检测器检查该呼叫的编号并确定应将作业转发到哪个模块。对于API函数调用,情况类似,但是API函数检测器将检查函数地址。开发了由一组模块组成的自省工具。这些模块是插入QEMU的动态库。模块可以通过交换数据进行交互。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号