Invariant Evaluation through Introspection for Proving Security Properties

نویسندگان

  • Fabrizio Baiardi
  • Dario Maggiari
  • Daniele Sgandurra
چکیده

Semantics-driven monitoring discovers attacks against a process by evaluating invariants on the process state. To increase the robustness and the transparency of semantics-driven monitoring, we propose an approach that introduces two virtual machines (VMs) running on the same platform. One VM runs the monitored process, i.e. the process to be protected, while the other one evaluates invariants on the process state each time a process invokes a system call. The evaluation of invariant exploits an Introspection Library that enables the monitoring VM to access the memory and the processor registers of the monitored VM. After describing the overall architecture of the proposed approach, we focus on the Introspection Library and the problems posed by the introspection of variables in the memory of a program running in a distinct VM to evaluate invariants. A first prototype implementation is also presented together with a set of performance results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Looking Backwards, Looking Inwards: Priors and Introspection

The three notions studied here are Bayesian priors, invariant priors and introspection. A prior for an agent is Bayesian, if it agrees with the agent’s posterior beliefs when conditioned on them. A prior is invariant, if it is the average, with respect to itself, of the posterior beliefs. Finally, an agent is introspective, if he is certain of his own beliefs. We show that a prior is Bayesian, ...

متن کامل

A Compositional Logic for Proving Security Properties of Protocols

We present a logic for proving security properties of protocols that usenonces (randomly generated numbers that uniquely identify a protocol ses-sion) and public-key cryptography. The logic, designed around a processcalculus with actions for each possible protocol step, consists of axiomsabout protocol actions and inference rules that yield assertions about proto-cols compos...

متن کامل

Pouring Cloud Virtualization Security Inside Out

In this article, virtualization security concerns in the cloud computing domain are reviewed. The focus is toward virtual machine (VM) security where attacks and vulnerabilities such as VM escape, VM hopping, cross-VM side-channel, VM-based rootkits (VMBRs), VM mobility, and VM remote are mentioned and discussed according to their relevance in the clouds. For each attack we outline how they aff...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Generalized weights: an anticode approach

In this paper we study generalized weights as an algebraic invariant of a code. We first describe anticodes in the Hamming and in the rank metric, proving in particular that optimal anticodes in the rank metric coincide with Frobenius-closed spaces. Then we characterize both generalized Hamming and rank weights of a code in terms of the intersection of the code with optimal anticodes in the res...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009