期刊文献+

一种恶意软件行为分析系统的设计与实现 被引量:2

Design and Achievement of Malware Analysis System based on Hardware-assisted Virtualization Monitor
下载PDF
导出
摘要 基于虚拟化技术的恶意软件行为分析是近年来出现的分析恶意软件的方法。该方法利用虚拟化平台良好的隔离性和控制力对恶意软件运行时的行为进行分析,但存在两方面的不足:一方面,现有虚拟机监视器(Virtual Machine Monitor,VMM)的设计初衷是提高虚拟化系统的通用性和高效性,并没有充分考虑虚拟化系统的透明性,导致现有的VMM很容易被恶意软件的环境感知测试所发现。为此,提出一种基于硬件辅助虚拟化技术的恶意软件行为分析系统——THVA。THVA是一个利用了安全虚拟机(SVM)、二级页表(NPT)和虚拟机自省等多种虚拟化技术完成的、专门针对恶意软件行为分析的微型VMM。实验结果表明,THVA在行为监控和反恶意软件检测方面表现良好。 Malware analysis based on Hardware-assisted Virtualization Monitor has been recently presently,which utilize the strong isolation and the ability to control Guest OS of virtualization platform to analyze the malware runtime behavior.But there are two shortages: one is that the design motive of VMM is not for transparency but for functionality and performance,which induce VMM to be detected by malware’s virtualization environment detection;another is that VMM’s code are too large and complex,and part of their function is unnecessary.These features bring more"side-effects"and vulnerabilities.Therefore,a malware analysis system based on Hardware-assisted Virtualization Monitor—THVA is presented.THVA is thin VMM,which only about 6000 lines code,utilizing the SVM,NPT,EAP and virtual machine introspection technologies to achieve,and special for malware analysis.The result of experiments shows that THVA is good for virtual machine introspection,behavior monitor and anti-detection,etc.In addition,THVA utilizes the Security Mode Transition technology to enhance the performance itself for about 18.2%.
出处 《计算机安全》 2012年第9期2-7,共6页 Network & Computer Security
关键词 硬件辅助虚拟化 恶意软件行为分析 虚拟机自省 二级页表 外部设备访问保护 Hardware-assisted Virtualization Monitor malware analysis virtual machine introspection NPT EAP
  • 相关文献

参考文献10

  • 1Artem Dinaburg , Paul R, oyal, Monirul Sharif , Wenke Lee. Ether : Malware Analysis via Hardware Virtualization Extensions n Proceedings of the communications security 15th ACM conference on Computer and 2008. 被引量:1
  • 2P. Ferrie. Attacks on virtual machine emulators, Jan 2007. 被引量:1
  • 3K. Fraser. x86: Update xen--detect utility to scan for Xen signature in CPU1D space, Dec 2008. xen-unstable mailing list. 被引量:1
  • 4V. Basili and B. T, Perricone. Software errors and complexity: an empirical investigation, 1993. 被引量:1
  • 5Advanced Micro Devices. AMD64 Architecture Programmer's Manual Volume 2: System Programming, 3.14 edition, Sep 2007. 被引量:1
  • 6Mark E. Russinovich, David A. Solomon .Microsoft Windows Internals: Microsoft Windows Server 2003,. 被引量:1
  • 7Intel Corporation2008,英特尔开源软件技术中心,复旦大学并行处理研究所,系统虚拟化:原理与实现,一北京:清华大学出版社,2009.3. 被引量:1
  • 8Advanced Micro Devices. AMD--V? Nested Paging. July 2008. 被引量:1
  • 9S .T .Jones Arpaci--Dusseau Environment [M]. (USENIX' 06), ,A .C .Arp&ci-Dusse&u, and R .H . Antfarm: Tracking Processs in a Virtual Machine In Proceedings of the USENIX Annual TechnicaJ Conference Boston, Massachusetts, June 2006. 被引量:1
  • 10Anh M. Nguyen, N&bil Schear, HeeDong Jung. MAVMM: Lightweight and Purpose Built VMM for Malware Analysis.2009. 被引量:1

同被引文献6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部