2018
DOI: 10.1007/978-3-030-00470-5_31
|View full text |Cite
|
Sign up to set email alerts
|

ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Due to the memory isolation mechanism, the target kernel module may introduce considerable performance overhead when it interacts with OS kernel very frequently. To address this issue, we may make use of the new hardware feature [25] for efficient context switch without the VMM involvement. However, this solution may require some modifications to the target kernel module.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…Due to the memory isolation mechanism, the target kernel module may introduce considerable performance overhead when it interacts with OS kernel very frequently. To address this issue, we may make use of the new hardware feature [25] for efficient context switch without the VMM involvement. However, this solution may require some modifications to the target kernel module.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…This limitation is shared by designs for secure hook insertion in a VM with a modified OS (e.g., [50], [51]), which are an alternative to invisible breakpoints. Recent developments in this area (e.g., [52], [53]) feature efficient isolation using the VMFUNC feature of VT extensions but introduce distinguishable code artifacts. Lately, the OASIS system [54] has made promising improvements in this direction.…”
Section: Other Related Workmentioning
confidence: 99%
“…In fact, instead of relaxing permissions by walking the SLAT tables, altp2m allows switching to another, less restrictive view. Both external [29], [30] and internal monitors [26], [41] use altp2m to allocate and switch between views. Although altp2m introduces a powerful means to rapidly change the guest's memory view, it requires hardware support to establish primitives that can be used by guests for isolating selected memory regions.…”
Section: B the Xen Altp2m Subsystemmentioning
confidence: 99%