Reliable Library Identification Using VMI Techniques
نویسندگان
چکیده
For cloud providers it is important to offer services that safeguard their users from existing vulnerabilities. Research has shown that is not uncommon for libraries to contain vulnerabilities that can have serious security implications. Traditional host based vulnerability scanners can be used to identify such vulnerable libraries. However, these scanners require the user to install and maintain the software. Our research explores the feasibility of implementing a reliable library identification scanner based on virtual machine introspection (VMI) techniques provided by LibVMI, which would not require such user intervention. We start by creating a program that combines the VMI techniques to extract a running library from a virtual machine’s memory with an implementation of a library identification method based on all the printable strings contained in the library’s binary. We then test the accuracy of our program and evaluate its performance by doing measurements of several indicators under different system loads. Our experiments show that our method can extract and accurately identify libraries within a few milliseconds.
منابع مشابه
Secure Log Transfer by Replacing a Library in a Virtual Machine
Ensuring the integrity of logs is essential to reliably detect and counteract attacks, because adversaries tamper with logs to hide their activities on a computer. Even though some research studies proposed different ways to protect log files, adversaries can tamper with logs in kernel space with kernel-level malicious software (malware). In an environment where Virtual Machines (VM) are utiliz...
متن کاملTire Inflation Pressure Estimation Using Identification Techniques
In this research study, one of the most crucial automotive engineering problems is intended to be solved. The necessity of tire pressure monitoring system is beyond doubt. Such systems are now provided relying on expensive sensors. In this study an indirect tire pressure monitoring system is proposed, utilizing identification techniques, which will reduce the cost of monitoring considerably in ...
متن کاملVMI-PL: A monitoring language for virtual platforms using virtual machine introspection
With the growth of virtualization and cloud computing, more and more forensic investigations rely on being able to perform live forensics on a virtual machine using virtual machine introspection (VMI). Inspecting a virtual machine through its hypervisor enables investigation without risking contamination of the evidence, crashing the computer, etc. To further access to these techniques for the ...
متن کامل3DUIdol - 6th annual 3DUI contest
The 6th annual IEEE 3DUI contest focuses on Virtual Music Instruments (VMIs), and on 3D user interfaces for playing them. The Contest is part of the IEEE 2015 3DUI Symposium held in Arles, France. The contest is open to anyone interested in 3D User Interfaces (3DUIs), from researchers to students, enthusiasts, and professionals. The purpose of the contest is to stimulate innovative and creative...
متن کاملHypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring
Security requirements in the cloud have led to the development of new monitoring techniques that can be broadly categorized as virtual machine introspection (VMI) techniques. VMI monitoring aims to provide high-fidelity monitoring while keeping the monitor secure by leveraging the isolation provided by virtualization. This work shows that not all hypervisor activity is hidden from the guest vir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017