2011 IEEE 30th International Symposium on Reliable Distributed Systems 2011
DOI: 10.1109/srds.2011.26
|View full text |Cite
|
Sign up to set email alerts
|

Process Implanting: A New Active Introspection Framework for Virtualization

Abstract: Abstract-Previous research on virtual machine introspection proposed "out-of-box" approach by moving out security tools from the guest operating system. However, compared to the traditional "in-the-box" approach, it remains a challenge to obtain a complete semantic view due to the semantic gap between the guest VM and the hypervisor.In this paper, we present Process Implanting, a new active VM introspection framework, to narrow the semantic gap by implanting a process from the host into the guest VM and execut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(27 citation statements)
references
References 16 publications
(17 reference statements)
0
27
0
Order By: Relevance
“…For example, Process implanting [47] implants and executes a monitoring process within a randomly-selected process already present in the VM. Any malicious agent inside the VM is unable to predict which guest process has been replaced and thus the injected code can run without detection.…”
Section: B Code Implantingmentioning
confidence: 99%
“…For example, Process implanting [47] implants and executes a monitoring process within a randomly-selected process already present in the VM. Any malicious agent inside the VM is unable to predict which guest process has been replaced and thus the injected code can run without detection.…”
Section: B Code Implantingmentioning
confidence: 99%
“…Gu et al [25] implemented a similar technique and took various precautions to ensure the security of this technique. In the approach they used, all OS libraries needed by the monitoring process are compiled statically to avoid the use of guest VM libraries, which are possible baits for a malware.…”
Section: Every Monitoring Process Is Given Explicit Rootmentioning
confidence: 99%
“…The introspection technique rectified almost all security vulnerabilities detected with the process implantation technique Virtuoso [25]. Virtuoso restricts the selection of the monitoring process, and it can only use tools provided by the OS [25].…”
Section: Every Monitoring Process Is Given Explicit Rootmentioning
confidence: 99%
See 1 more Smart Citation
“…Fu et al [14] proposed VMST tools that can automatically identify the introspection related data and redirect these data accesses to the in-guest kernel memory. Gu et al [33] presented a process implanting technique with the idea that, instead of inspecting the guest OS from the outside, it can implant a host process inside the guest OS and protect that process from the hypervisor. In this way, the implanted process can monitor the guest OS internally (as opposed to externally).…”
Section: A Virtual Machine Introspection (Vmi)mentioning
confidence: 99%