2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.49
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System

Abstract: The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of virtualization. In this work we challenge this traditional model and propose a collaboration approach between a virtualizationaware operating system and a VM layer to prevent tampering against kernel code and data. Our integrity model is a relaxed version of Biba's and the main idea is to have all attempted writes into kernel code and data seg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…OSck [28] will treat our malicious function as benign as it has the same signature as the benign one. The strategy presented in [34] can defeat this keylogger as the hijack of the original receive buffer function will correspond to a write into the kernel data segment by a suspicious instruction (its bytes came from the network).…”
Section: Limitations and Defensesmentioning
confidence: 99%
See 1 more Smart Citation
“…OSck [28] will treat our malicious function as benign as it has the same signature as the benign one. The strategy presented in [34] can defeat this keylogger as the hijack of the original receive buffer function will correspond to a write into the kernel data segment by a suspicious instruction (its bytes came from the network).…”
Section: Limitations and Defensesmentioning
confidence: 99%
“…In previous work [34] we developed a proof-of-concept prototype for a system where a guest OS and a VM layer communicated to prevent tampering against kernel code and data segments at the architectural level. The system employed a dynamic information flow tracking (DIFT) system [9] that tainted network bytes.…”
Section: A State-of-the-art In Kernel Defensementioning
confidence: 99%
“…However we still believe that such assumption could provide coverage for a great number of attacks. We plan to adopt the same DIFT system we introduced in [31].…”
Section: Assumptionsmentioning
confidence: 99%
“…Many hypervisor-based security systems have been designed and reported in the literature. For instance, a hypervisor can be applied for I/O related protection [9,31], for kernel integrity protection [3,13,23,26,28,41,42], and for user space protection [6,7,12,21,34,43]. By studying these systems, we identify cryptographic engine, measurement, emulation, interception and manipulation as the fundamental security primitives which are adopted in Guardian as well.…”
Section: Related Workmentioning
confidence: 99%