DocumentCode :
2875463
Title :
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
Author :
Bahram, Sina ; Jiang, Xuxian ; Wang, Zhi ; Grace, Mike ; Li, Jinku ; Srinivasan, Deepa ; Rhee, Junghwan ; Xu, Dongyan
Author_Institution :
North Carolina State Univ., Raleigh, NC, USA
fYear :
2010
fDate :
Oct. 31 2010-Nov. 3 2010
Firstpage :
82
Lastpage :
91
Abstract :
Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection solutions share a common questionable assumption. This assumption is embodied in the expectation that original kernel data structures are respected by the untrusted guest and thus can be directly used to bridge the well-known semantic gap. In this paper, we assume the perspective of the attacker, and exploit this questionable assumption to subvert VM introspection. In particular, we present an attack called DKSM (Direct Kernel Structure Manipulation), and show that it can effectively foil existing VM introspection solutions into providing false information. By assuming this perspective, we hope to better understand the challenges and opportunities for the development of future reliable VM introspection solutions that are not vulnerable to the proposed attack.
Keywords :
data structures; security of data; virtual machines; direct kernel structure manipulation; kernel data structures; virtual machine introspection; Data structures; Kernel; Malware; Monitoring; Reliability; Semantics; Switches; Direct Kernel Structure Manipulation; Introspection; Virtualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reliable Distributed Systems, 2010 29th IEEE Symposium on
Conference_Location :
New Delhi
ISSN :
1060-9857
Print_ISBN :
978-0-7695-4250-8
Type :
conf
DOI :
10.1109/SRDS.2010.39
Filename :
5623380
Link To Document :
بازگشت