2018
DOI: 10.1007/978-3-319-99828-2_19
|View full text |Cite
|
Sign up to set email alerts
|

Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection

Abstract: The growing complexity of modern malware drives security applications to leverage Virtual Machine Introspection (VMI), which provides a complete and untainted view over the Virtual Machine state. To benefit from this ability, a VMI-aware Virtual Machine Monitor (VMM) must be set up in advance underneath the target system; a constraint for the massive application of VMI. In this paper, we present WhiteRabbit, a VMI framework comprising a microkernel-based VMM that transparently virtualizes a running Operating S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Unauthorized accesses to guest-physical memory, which is either not mapped or lacks privileges in the SLAT table, trap into the VMM [36], [37]. As the VMM exclusively maintains the SLAT tables, it can fully control a VM's view on its physical memory [29], [30], [38], [39]. Xen's physical-tomachine subsystem (p2m) [37], [40] employs SLAT to define the guest's view of the physical memory that is perceived by all virtual CPUs (vCPUs).…”
Section: B the Xen Altp2m Subsystemmentioning
confidence: 99%
See 1 more Smart Citation
“…Unauthorized accesses to guest-physical memory, which is either not mapped or lacks privileges in the SLAT table, trap into the VMM [36], [37]. As the VMM exclusively maintains the SLAT tables, it can fully control a VM's view on its physical memory [29], [30], [38], [39]. Xen's physical-tomachine subsystem (p2m) [37], [40] employs SLAT to define the guest's view of the physical memory that is perceived by all virtual CPUs (vCPUs).…”
Section: B the Xen Altp2m Subsystemmentioning
confidence: 99%
“…All reported results correspond to vanilla Linux vs. xMP-enabled Linux (both running as DomU VMs), and are means over 10 runs. Note that the virtualization overhead of Xen is negligible [39] and is therefore disregarded in our setting.…”
Section: B Performance Evaluationmentioning
confidence: 99%