2012
DOI: 10.1007/978-3-642-33338-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection

Abstract: Effectively protecting the Windows OS is a challenging task, since most implementation details are not publicly known. Windows has always been the main target of malwares that have exploited numerous bugs and vulnerabilities. Recent trusted boot and additional integrity checks have rendered the Windows OS less vulnerable to kernel-level rootkits. Nevertheless, guest Windows Virtual Machines are becoming an increasingly interesting attack target. In this work we introduce and analyze a novel Hypervisor-Based In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…The implemented security monitor is external to the target machine, similarly to some recent literature [7], [8], [9]. By leveraging VMI and current FMA tools, we developed a novel Hypervisor-Based Introspection System (HyBIS) for protecting a Windows OS from stealth malware, in particular from rootkits.…”
Section: Contributionmentioning
confidence: 99%
“…The implemented security monitor is external to the target machine, similarly to some recent literature [7], [8], [9]. By leveraging VMI and current FMA tools, we developed a novel Hypervisor-Based Introspection System (HyBIS) for protecting a Windows OS from stealth malware, in particular from rootkits.…”
Section: Contributionmentioning
confidence: 99%
“…For example, [Srinivasan et al 2011] present a technique called process out-grafting, which relocates a suspect process from inside a VM to run side-by-side with the out-of-box VM. SYRINGE [Carbone et al 2012] protects the monitoring application by moving it in a separate VM where it can invoke guest functions using function-call injection. Another solution is Virtuoso [Dolan-Gavitt et al 2011], which is an approach to automatically creating introspection tools.…”
Section: Using An Admin Vm For Protectionmentioning
confidence: 99%
“…Any malicious agent inside the VM is unable to predict which guest process has been replaced and thus the injected code can run without detection. Rather than implant a complete process, SYRINGE [30] implants functions into the kernel, which can be called from the VM.…”
Section: B Code Implantingmentioning
confidence: 99%
“…Ensuring CFI is a broad problem with a range of techniques. For instance, Program Shepherding [59] protects the integrity of implanted functions [30] ( §III-B), using a machine code interpreter to monitor all control transfers and guarantee that each transfer satisfies a given security policy. Discovering efficient CFI mechanisms is a relevant, but complimentary problem to VMI.…”
Section: Kernel Executable Integritymentioning
confidence: 99%