首页> 外文OA文献 >HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code
【2h】

HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code

机译:HyperLink:不带内核源代码的虚拟机自省和内存取证分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Virtual Machine Introspection (VMI) is an approach to inspecting and analyzing the software running inside a virtual machine from the hypervisor. Similarly, memory forensics analyzes the memory snapshots or dumps to understand the runtime state of a physical or virtual machine. The existing VMI and memory forensic tools rely on up-to-date kernel information of the target operating system (OS) to work properly, which often requires the availability of the kernel source code. This requirement prevents these tools from being widely deployed in real cloud environments. In this paper, we present a VMI tool called HyperLink that partially retrieves running process information from a guest virtual machine without its source code. While current introspection and memory forensic solutions support only one or a limited number of kernel versions of the target OS, HyperLink is a one-for-many introspection and forensic tool, i.e., it supports most, if not all, popular OSes regardless of their versions. We implement both online and offline versions of HyperLink.We validate the efficacy of HyperLink under different versions of Linux, Windows, FreeBSD, and Mac OS X. For all the OSes we tested, HyperLink can successfully retrieve the process information in one minute or several seconds. Through online and offline analyses, we demonstrate that HyperLink can help users detect real-world kernel rootkits and play an important role in intrusion detection. Due to its version-agnostic property, HyperLink could become the first introspection and forensic tool that works well in autonomic cloud computing environments.
机译:虚拟机自检(VMI)是一种从管理程序检查和分析虚拟机内部运行的软件的方法。同样,内存取证分析内存快照或转储,以了解物理或虚拟机的运行时状态。现有的VMI和内存取证工具依赖于目标操作系统(OS)的最新内核信息来正常工作,这通常需要内核源代码的可用性。此要求阻止了这些工具在真实云环境中广泛部署。在本文中,我们介绍了一种称为HyperLink的VMI工具,该工具可部分地从来宾虚拟机中检索运行过程信息,而无需提供其源代码。虽然当前的内省和内存取证解决方案仅支持目标操作系统的一个或有限数量的内核版本,但是HyperLink是一对多的内省和取证工具,即,它支持大多数(如果不是全部)流行的OS,无论它们是否支持版本。我们同时实现了在线和离线版本的HyperLink。我们验证了HyperLink在Linux,Windows,FreeBSD和Mac OS X的不同版本下的功效。对于我们测试的所有OS,HyperLink都可以在一分钟或几分钟内成功检索过程信息。秒。通过在线和离线分析,我们证明了HyperLink可以帮助用户检测真实世界的内核rootkit,并在入侵检测中发挥重要作用。由于其与版本无关的特性,HyperLink可以成为第一个在自主云计算环境中运行良好的自省和取证工具。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号