Hypervisor Support for Identifying Covertly Executing Binaries

نویسندگان

  • Lionel Litty
  • H. Andrés Lagar-Cavilla
  • David Lie
چکیده

Hypervisors have been proposed as a security tool to defend against malware that subverts the OS kernel. However, hypervisors must deal with the semantic gap between the low-level information available to them and the high-level OS abstractions they need for analysis. To bridge this gap, systems have proposed making assumptions derived from the kernel source code or symbol information. Unfortunately, this information is nonbinding – rootkits are not bound to uphold these assumptions and can escape detection by breaking them. In this paper, we introduce Patagonix, a hypervisorbased system that detects and identifies covertly executing binaries without making assumptions about the OS kernel. Instead, Patagonix depends only on the processor hardware to detect code execution and on the binary format specifications of executables to identify code and verify code modifications. With this, Patagonix can provide trustworthy information about the binaries running on a system, as well as detect when a rootkit is hiding or tampering with executing code. We have implemented a Patagonix prototype on the Xen 3.0.3 hypervisor. Because Patagonix makes no assumptions about the OS kernel, it can identify code from application and kernel binaries on both Linux and Windows XP. Patagonix introduces less than 3% overhead on most applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud

The Infrastructure as a Service (IaaS) cloud computing model is widely used in current IT industry, providing the cloud users virtual machines as the executing environment. However, current executing environment the cloud provided is not trustworthy. For a user’s executing environment faces threats from malicious cloud users who aim at attacking the underlying virtualization software (virtual m...

متن کامل

Soroban: Attributing Latency in Virtualized Environments

Applications executing on a hypervisor or in a container experience a lack of performance isolation from other services executing on shared resources. Latencysensitive applications executing in the cloud therefore have highly-variable response times, yet attributing the additional latency caused by virtualization overheads on individual requests is an unsolved problem. We present Soroban, a fra...

متن کامل

Checkpointing an Operating System Using a Parapass-through Hypervisor

Many dynamic malware analysis systems based on hypervisors have been proposed. Although they support malware analysis effectively, many of them have a shortcoming that permits the malware to easily recognize the virtualized hardware and change its execution to prevent analysis. We contend that this drawback can be mitigated using a hypervisor that virtualizes the minimum number of hardware acce...

متن کامل

THROOM — Running POSIX Multithreaded Binaries on a Cluster

Most software distributed shared memory systems (SW-DSMs) lack industry standard interfaces that limit their applicability to a small set of shared-memory applications. In order to gain general acceptance, SW-DSMs should support the same look-and-feel of shared memory as hardware DSMs. This paper presents a runtime system concept that enables unmodified POSIX P1003.1c (Pthreads) compliant binar...

متن کامل

Cmpsci 677 Operating Systems 6.1 Virtualization Recap 6.2 Virtualization Continued 6.2.1 Type 2 Hypervisor

Virtualization was discussed and defined as mimicking one interface using another. Different types of virtualization (like native, application-level etc.) were discussed. Understanding Type 1 virtualization requires some background on how CPUs is designed. A processor can operate in two modes: user mode or kernel mode. Also referred to in terms of rings of protection: ring 1 or ring 3 (for user...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008