• DocumentCode
    245609
  • Title

    FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight Hypervisor

  • Author

    Yan Wen ; Jinjing Zhao ; Shuanghui Yi ; Xiang Li

  • Author_Institution
    Beijing Inst. of Syst. Eng., Beijing, China
  • fYear
    2014
  • fDate
    19-21 Dec. 2014
  • Firstpage
    620
  • Lastpage
    626
  • Abstract
    Various malicious applications trend to access the user´s files to achieve their functionalities. Such unauthorized file accesses may bring on the user data leakage or other threats. In this paper, we propose a novel light-weight hardware-assisted hyper visor, namely FVisor, to thwart such unauthorized file accesses. FVisor has three distinct advantages over existing hyper visor/host-based approaches: preinstalled commodity OS compatibility, non-by passable interception of files accesses and block level file-ware. Unlike typical hyper visors, deploying FVisor does not require OS reinstallation. FVisor intercepts the instruction-level interactions between the OS and the underlying hardware, instead of traditional API hooks. FVisor thus can manipulate the file accesses at the hyper visor layer instead of the OS layer, which is subvert able for the privileged malware. Besides, FVisor reconstructs the file system structures within the hyper visor at the block level without depending on the OS APIs. Our functionality evaluation shows FVisor is a feasible way to impede unauthorized file accesses while the performance evaluation shows desktop-oriented workloads achieve 93.57% of native speed on average.
  • Keywords
    authorisation; invasive software; operating systems (computers); virtual machines; FVisor; OS API; block level; block level file-ware; desktop-oriented workloads; file system structures; functionality evaluation; hypervisor layer; instruction-level interactions; light-weight hardware-assisted hypervisor; malicious applications; nonbypassable file access interception; performance evaluation; preinstalled commodity OS compatibility; privileged malware; thwarting unauthorized file access; user data leakage; user file access; File systems; Hardware; Kernel; Malware; Performance evaluation; Virtual machine monitors; Virtualization; hypervisor; malware; virtual machine;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-1-4799-7980-6
  • Type

    conf

  • DOI
    10.1109/CSE.2014.136
  • Filename
    7023646