2014 IEEE Symposium on Security and Privacy 2014
DOI: 10.1109/sp.2014.45
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Introspections on Trust and the Semantic Gap

Abstract: Abstract-An essential goal of Virtual Machine Introspection (VMI) is assuring security policy enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental obstacle to this goal is the difficulty in accurately extracting semantic meaning from the hypervisor's hardwarelevel view of a guest OS, called the semantic gap. Over the twelve years since the semantic gap was identified, immense progress has been made in developing powerful VMI tools.Unfortunately, much of this progress has … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 84 publications
(37 citation statements)
references
References 62 publications
0
37
0
Order By: Relevance
“…By bridging the semantic gap within the SMI handler, we can ascertain the state of the thread executing in Protected Mode. This is similar to Virtual Machine Introspection (VMI) systems [47]. We need to continue our analysis in the SMI handler only if the SMRAM state belongs to a thread we are interested in debugging.…”
Section: B Debugging Servermentioning
confidence: 99%
“…By bridging the semantic gap within the SMI handler, we can ascertain the state of the thread executing in Protected Mode. This is similar to Virtual Machine Introspection (VMI) systems [47]. We need to continue our analysis in the SMI handler only if the SMRAM state belongs to a thread we are interested in debugging.…”
Section: B Debugging Servermentioning
confidence: 99%
“…Over the past few years, concrete contributions to VMI have been made, and various methods have been suggested to inspect VM data from the outside [22][23][24]. As mentioned above, the difficulty in interpreting the lowlevel bits and bytes of a VM into the high-level semantic state of a guest OS is called the "semantic gap problem" [25][26][27][28]. It is very difficult to derive a complete view of a guest OS from outside a GM without knowledge of the hardware architecture or guest OS [29].…”
Section: Vmi-based Malwarementioning
confidence: 99%
“…This problem has been a main motivation for a significant portion of research over the last decade. However, with recent advances in forensics tools, the semantic gap problem can be considered a solved engineering problem [21].…”
Section: Intrusion Detection and Analysismentioning
confidence: 99%