期刊文献+

恶意代码安全虚拟执行环境研究 被引量:3

Research on Malware Secure Virtual Execution Environments
下载PDF
导出
摘要 入侵容忍的系统要求具有在现实环境中执行不安全程序且不遭受永久性伤害的能力。虚拟机技术提供了一种虚拟的可执行环境,能够满足这个需求。通过对操作系统调用接口资源的重命名的研究,在此基础上设计并实现了一种Windows平台下基于操作系统层的安全虚拟执行环境的体系结构。实验结果表明,该系统可以有效地模拟应用程序的各种运行行为和结果,并为后续分析提供充足的信息。经对比发现,基于操作系统资源虚拟化的安全执行环境技术比传统虚拟技术更灵活,消耗系统资源更少。 Intrusion tolerant and fault-tolerant systems require the ability to execute unknown programs in a realistic environment without leaving permanent damages. Virtual machine technique provides an execution environment that is both realistic and isolated, also meet this requirement. We present a new secure execution environments framework. After researched on rename mechanism of system call interface under operating systems, finally designed and implemented the system architecture of operating system level based secure execution environment under Windows. Central to our algorithm is namespace virtualization, which provides simulation of many runtime behaviors and results in appli cations with enough analysis information. Compared with traditional algorithms, our method is more flexible, and requires less system resource.
出处 《计算机科学》 CSCD 北大核心 2008年第1期97-99,共3页 Computer Science
基金 国家科技基础条件平台工作基金资助项目(2003DIA7J051)
关键词 恶意代码 安全执行 虚拟机 命名空间虚拟化 Malware, Secure execution, Virtual machine, Namespace virtualization
  • 相关文献

参考文献5

  • 1Nanda S, Chiueh T. A Survey on Virtualization Technologies: [RPE Report]. State University of New York at Stony Brook, Fevrier, 2005. 被引量:1
  • 2Battistoni R, Gabrielli E, Mancini L V. A host intrusion prevention system for Windows operating systems. In: ESORICS' 04, 2004. 被引量:1
  • 3Lam L, Chiueh. Automatic extraction of accurate application-specific sandboxing policy. In:RAID 04, Proceedings of the International Symposium on Recent Advances in Intrusion Detection, 2004. 被引量:1
  • 4Russinovich M, Cogswell B. Windows NT System-Call Hooking. Dr. Dobb's Journal, January 1997. 被引量:1
  • 5Srinivasan S M, Kandula S, Andrews C R, Zhou Y. Flashback: A lightweight extension for rollback and deterministic replay for software debugging. In:Proceedings of the 2004 USENIX Technical Conference, 2004. 被引量:1

同被引文献16

  • 1丁丽萍,王永吉.多维计算机取证模型研究[J].计算机安全,2005(11):5-9. 被引量:9
  • 2苏璞睿,杨轶.基于可执行文件静态分析的入侵检测模型[J].计算机学报,2006,29(9):1572-1578. 被引量:14
  • 3Necula G. Proof-Carrying code [J]. In: Jones N, Lee P, eds. Proc. of the POPL'97. New York: ACM Press, 1997:106-119. 被引量:1
  • 4Appel A. Foundational proof-carrying code [J].In: Mairson H, ed. Proc. of the 16th Annual IEEE Syrup. on Logic in Computer Science. Washington: IEEE Computer Society, 2001 : 247-258. 被引量:1
  • 5S.Tweedie,T.Y Ts'o. Planned Extensions to the Linux Ext2/Ext3 Filesystem[A].Montery CA,2002. 被引量:1
  • 6K.D.Fairbanks,C.P.Lee,H.L Owen Ⅲ. Forensic implications of EXT4[A].New York,NY,USA:ACM,2010. 被引量:1
  • 7D.Farmer,W.Venema. The Coroner's Toolkit[OL].http://www.porcupine.org/forensics/tct.ht ml,. 被引量:1
  • 8D.Farmer,W.Venema. Forensics Discovery[M].Boston:Addison-Wesley Professional,2005. 被引量:1
  • 9James M;Aquilina;Eoghan Casey.Malware Forensics Investigating and Analyzing Malicious Code[M]北京:科学出版社,2009. 被引量:1
  • 10G.Mohay. Technical Challenges and Directions for Digital Forensics[A].2005. 被引量:1

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部