Cargando…

Hardware assisted hypervisor introspection

In this paper, we introduce hypervisor introspection, an out-of-box way to monitor the execution of hypervisors. Similar to virtual machine introspection which has been proposed to protect virtual machines in an out-of-box way over the past decade, hypervisor introspection can be used to protect hyp...

Descripción completa

Detalles Bibliográficos
Autores principales: Shi, Jiangyong, Yang, Yuexiang, Tang, Chuan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4870477/
https://www.ncbi.nlm.nih.gov/pubmed/27330913
http://dx.doi.org/10.1186/s40064-016-2257-7
_version_ 1782432439581278208
author Shi, Jiangyong
Yang, Yuexiang
Tang, Chuan
author_facet Shi, Jiangyong
Yang, Yuexiang
Tang, Chuan
author_sort Shi, Jiangyong
collection PubMed
description In this paper, we introduce hypervisor introspection, an out-of-box way to monitor the execution of hypervisors. Similar to virtual machine introspection which has been proposed to protect virtual machines in an out-of-box way over the past decade, hypervisor introspection can be used to protect hypervisors which are the basis of cloud security. Virtual machine introspection tools are usually deployed either in hypervisor or in privileged virtual machines, which might also be compromised. By utilizing hardware support including nested virtualization, EPT protection and #BP, we are able to monitor all hypercalls belongs to the virtual machines of one hypervisor, include that of privileged virtual machine and even when the hypervisor is compromised. What’s more, hypercall injection method is used to simulate hypercall-based attacks and evaluate the performance of our method. Experiment results show that our method can effectively detect hypercall-based attacks with some performance cost. Lastly, we discuss our furture approaches of reducing the performance cost and preventing the compromised hypervisor from detecting the existence of our introspector, in addition with some new scenarios to apply our hypervisor introspection system.
format Online
Article
Text
id pubmed-4870477
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-48704772016-06-21 Hardware assisted hypervisor introspection Shi, Jiangyong Yang, Yuexiang Tang, Chuan Springerplus Research In this paper, we introduce hypervisor introspection, an out-of-box way to monitor the execution of hypervisors. Similar to virtual machine introspection which has been proposed to protect virtual machines in an out-of-box way over the past decade, hypervisor introspection can be used to protect hypervisors which are the basis of cloud security. Virtual machine introspection tools are usually deployed either in hypervisor or in privileged virtual machines, which might also be compromised. By utilizing hardware support including nested virtualization, EPT protection and #BP, we are able to monitor all hypercalls belongs to the virtual machines of one hypervisor, include that of privileged virtual machine and even when the hypervisor is compromised. What’s more, hypercall injection method is used to simulate hypercall-based attacks and evaluate the performance of our method. Experiment results show that our method can effectively detect hypercall-based attacks with some performance cost. Lastly, we discuss our furture approaches of reducing the performance cost and preventing the compromised hypervisor from detecting the existence of our introspector, in addition with some new scenarios to apply our hypervisor introspection system. Springer International Publishing 2016-05-17 /pmc/articles/PMC4870477/ /pubmed/27330913 http://dx.doi.org/10.1186/s40064-016-2257-7 Text en © The Author(s). 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Research
Shi, Jiangyong
Yang, Yuexiang
Tang, Chuan
Hardware assisted hypervisor introspection
title Hardware assisted hypervisor introspection
title_full Hardware assisted hypervisor introspection
title_fullStr Hardware assisted hypervisor introspection
title_full_unstemmed Hardware assisted hypervisor introspection
title_short Hardware assisted hypervisor introspection
title_sort hardware assisted hypervisor introspection
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4870477/
https://www.ncbi.nlm.nih.gov/pubmed/27330913
http://dx.doi.org/10.1186/s40064-016-2257-7
work_keys_str_mv AT shijiangyong hardwareassistedhypervisorintrospection
AT yangyuexiang hardwareassistedhypervisorintrospection
AT tangchuan hardwareassistedhypervisorintrospection