Reliable Library Identification Using VMI Techniques

نویسندگان

  • Nick de Bruijn
  • Leandro Velasco
چکیده

For cloud providers it is important to offer services that safeguard their users from existing vulnerabilities. Research has shown that is not uncommon for libraries to contain vulnerabilities that can have serious security implications. Traditional host based vulnerability scanners can be used to identify such vulnerable libraries. However, these scanners require the user to install and maintain the software. Our research explores the feasibility of implementing a reliable library identification scanner based on virtual machine introspection (VMI) techniques provided by LibVMI, which would not require such user intervention. We start by creating a program that combines the VMI techniques to extract a running library from a virtual machine’s memory with an implementation of a library identification method based on all the printable strings contained in the library’s binary. We then test the accuracy of our program and evaluate its performance by doing measurements of several indicators under different system loads. Our experiments show that our method can extract and accurately identify libraries within a few milliseconds.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Log Transfer by Replacing a Library in a Virtual Machine

Ensuring the integrity of logs is essential to reliably detect and counteract attacks, because adversaries tamper with logs to hide their activities on a computer. Even though some research studies proposed different ways to protect log files, adversaries can tamper with logs in kernel space with kernel-level malicious software (malware). In an environment where Virtual Machines (VM) are utiliz...

متن کامل

Tire Inflation Pressure Estimation Using Identification Techniques

In this research study, one of the most crucial automotive engineering problems is intended to be solved. The necessity of tire pressure monitoring system is beyond doubt. Such systems are now provided relying on expensive sensors. In this study an indirect tire pressure monitoring system is proposed, utilizing identification techniques, which will reduce the cost of monitoring considerably in ...

متن کامل

VMI-PL: A monitoring language for virtual platforms using virtual machine introspection

With the growth of virtualization and cloud computing, more and more forensic investigations rely on being able to perform live forensics on a virtual machine using virtual machine introspection (VMI). Inspecting a virtual machine through its hypervisor enables investigation without risking contamination of the evidence, crashing the computer, etc. To further access to these techniques for the ...

متن کامل

3DUIdol - 6th annual 3DUI contest

The 6th annual IEEE 3DUI contest focuses on Virtual Music Instruments (VMIs), and on 3D user interfaces for playing them. The Contest is part of the IEEE 2015 3DUI Symposium held in Arles, France. The contest is open to anyone interested in 3D User Interfaces (3DUIs), from researchers to students, enthusiasts, and professionals. The purpose of the contest is to stimulate innovative and creative...

متن کامل

Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring

Security requirements in the cloud have led to the development of new monitoring techniques that can be broadly categorized as virtual machine introspection (VMI) techniques. VMI monitoring aims to provide high-fidelity monitoring while keeping the monitor secure by leveraging the isolation provided by virtualization. This work shows that not all hypervisor activity is hidden from the guest vir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017