DocumentCode :
3704005
Title :
Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal ARM Hypervisor
Author :
Julian Horsch;Sascha Wessel
Author_Institution :
Fraunhofer AISEC, Garching near Munich, Germany
Volume :
1
fYear :
2015
Firstpage :
408
Lastpage :
417
Abstract :
In this paper, we present a framework for transparent kernel and user execution tracing from a minimal ARM hypervisor. The framework utilizes hardware-supported virtualization on modern ARM CPUs to restrict the number of executable pages in the system without interfering with the traced guest. The resulting page faults give the framework access to page-granular control flow information. The framework is transparent and agnostic to kernel and user space software not requiring any changes or additional components in the traced guest. The application scenarios for the framework include malware analysis, malware detection and runtime integrity protection. We furthermore present a detailed example application for the framework which uses the provided trace data to enforce a particular page-granular control flow to defend the guest against control flow hijacking attacks like return-oriented programming. The detailed performance analysis of our prototype implementation running on a Cortex-A15 development board with Android shows that the framework and the example application perform well even in adverse benchmarking scenarios. Therefore, the framework not only can be useful for realizing virtualization-based security mechanisms known and researched on x86 platforms for ARM, but also shows that the very lightweight ARM hardware virtualization support allows for new mechanisms relying on very frequent interaction with the hypervisor.
Keywords :
"Virtual machine monitors","Kernel","Aerospace electronics","Malware","Virtualization"
Publisher :
ieee
Conference_Titel :
Trustcom/BigDataSE/ISPA, 2015 IEEE
Type :
conf
DOI :
10.1109/Trustcom.2015.401
Filename :
7345309
Link To Document :
بازگشت