Title :
FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight Hypervisor
Author :
Yan Wen ; Jinjing Zhao ; Shuanghui Yi ; Xiang Li
Author_Institution :
Beijing Inst. of Syst. Eng., Beijing, China
Abstract :
Various malicious applications trend to access the user´s files to achieve their functionalities. Such unauthorized file accesses may bring on the user data leakage or other threats. In this paper, we propose a novel light-weight hardware-assisted hyper visor, namely FVisor, to thwart such unauthorized file accesses. FVisor has three distinct advantages over existing hyper visor/host-based approaches: preinstalled commodity OS compatibility, non-by passable interception of files accesses and block level file-ware. Unlike typical hyper visors, deploying FVisor does not require OS reinstallation. FVisor intercepts the instruction-level interactions between the OS and the underlying hardware, instead of traditional API hooks. FVisor thus can manipulate the file accesses at the hyper visor layer instead of the OS layer, which is subvert able for the privileged malware. Besides, FVisor reconstructs the file system structures within the hyper visor at the block level without depending on the OS APIs. Our functionality evaluation shows FVisor is a feasible way to impede unauthorized file accesses while the performance evaluation shows desktop-oriented workloads achieve 93.57% of native speed on average.
Keywords :
authorisation; invasive software; operating systems (computers); virtual machines; FVisor; OS API; block level; block level file-ware; desktop-oriented workloads; file system structures; functionality evaluation; hypervisor layer; instruction-level interactions; light-weight hardware-assisted hypervisor; malicious applications; nonbypassable file access interception; performance evaluation; preinstalled commodity OS compatibility; privileged malware; thwarting unauthorized file access; user data leakage; user file access; File systems; Hardware; Kernel; Malware; Performance evaluation; Virtual machine monitors; Virtualization; hypervisor; malware; virtual machine;
Conference_Titel :
Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4799-7980-6
DOI :
10.1109/CSE.2014.136