期刊文献+

虚拟机自省技术研究与应用进展 被引量:17

Research and Application Progress of Virtual Machine Introspection Technology
下载PDF
导出
摘要 虚拟机自省技术是备受学术界和工业界关注的安全方法,在入侵检测、内核完整性保护等多方面发挥了重要作用.该技术在实现过程中面临的核心难题之一是底层状态数据与所需高层语义之间的语义鸿沟,该难题限制了虚拟机自省技术的发展与广泛应用.为此,基于语义重构方式的不同将现有的虚拟机自省技术分为4类,并针对每一类自省技术中的关键问题及其相关工作进行了梳理;然后,在安全性、性能及可获取的高层语义信息量等方面对这4类方法进行了比较分析,结果显示,不同方法在指定比较维度上均有较大波动范围,安全研究人员需综合考虑4类方法的特点设计满足自身需求的虚拟机自省方案.最后,详细介绍了虚拟机自省技术在安全领域的应用情况,并指出了该技术在安全性、实用性及透明性等方面需深入研究的若干问题. Virtual machine introspection(VMI) has received much attention from both academic and industrial community, and plays an important role in intrusion detection, kernel integrity protection and many other areas. However, the semantic gap has greatly limited the development of this technology. In this respect, this paper divides existing VMI technologies into four categories based on the methods of semantic reconstruction, followed by the problems and their corresponding researches. Analysis results reveal the difficulties in meeting all the requirements. The paper therefore details the relevant applied research in security based on VMI. Finally, it presents the future research directions that need in-depth study, such as VMI's security, availability and transparency.
出处 《软件学报》 EI CSCD 北大核心 2016年第6期1384-1401,共18页 Journal of Software
基金 国家自然科学基金(61402464) 国家高技术研究发展计划(863)(2015AA016005)~~
关键词 虚拟机自省 语义鸿沟 软件结构知识 硬件架构知识 安全应用 virtual machine introspection semantic gap knowledge of software structure knowledge of hardware architecture security application
  • 相关文献

参考文献4

二级参考文献34

  • 1刘正伟,文中领,张海涛.云计算和云数据管理技术[J].计算机研究与发展,2012,49(S1):26-31. 被引量:170
  • 2唐勇,卢锡城,胡华平,朱培栋.Honeypot技术及其应用研究综述[J].小型微型计算机系统,2007,28(8):1345-1351. 被引量:9
  • 3Silberman P, et al. FUTo uninformed[EB/OL]. 2006. [2010-12-10]. http://uninformed, org/?v= 3&a = 7&t = sumry. 被引量:1
  • 4Jones S T, Arpaci Dusseau A C, Arpaci-Dusseau R H. VMM-based hidden process detection and identification using Lycosid[C] //Proc of the 4th Int Conf on Virtual Execulion Environments (VEE08). New York: ACM, 2008:91-100. 被引量:1
  • 5Litty L, Lagar Cavilla H A, Lie I). Hypervisor support for identifying covertly executing binaries [C] //Proc of the 17th Conf on Security Symp. Berkeley: USENIX, 2008: 243-258. 被引量:1
  • 6Hoglund G. Kernel object hooking rootkits (KOH rootkits) [EB/OL]. 2006. [2008-12-10], http://www, rootkit, corn/ newsread, php?newsid: 501. 被引量:1
  • 7lntel Corporation. Intel: 64 and IA-32 architectures software developer's manual volume 3A: System programming guide, Part 1 [EB/OL]. 2010. [2010-12-10]. http: //www. intel. com/Assets/PDF/manual/253 668. pdf. 被引量:1
  • 8Riley R, Jiang X, Xu D. Multi aspect profiling of kernel rootkit behavior [C] //Proc of the 4th ACM European Conf on Computer Systems (EuroSys 09). New York: ACM, 2009:47-60. 被引量:1
  • 9Garfinkel T, Rosenblum M. A machine introspection-based architecture for intrusion detection [C] //Proc of the 10th Network and Distributed System Security Symp. Washington DC: Internet Society, 2003:191-206. 被引量:1
  • 10Litty L, Lie D. Manitou: A layer-below approach to fighting malware [C]//Proc of the Workshop Architectural and System Support for Improving Software Dependability (ASID 06). NewYork: ACM, 2006:6-11. 被引量:1

共引文献96

同被引文献75

引证文献17

二级引证文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部