• DocumentCode
    244372
  • Title

    System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs

  • Author

    Rui Wu ; Ping Chen ; Peng Liu ; Bing Mao

  • Author_Institution
    Dept. of Comput. Sci. & Technol., Nanjing Univ., Nanjing, China
  • fYear
    2014
  • fDate
    23-26 June 2014
  • Firstpage
    574
  • Lastpage
    585
  • Abstract
    Existing VMI techniques have high overhead, and require customized introspection programs/tools for different guest OS versions - lack of generality. In this paper, we present Shadow Context, a system for close-to-real time manual-effort-free VMI. Shadow Context can meet several important real-world VMI needs which existing VMI techniques cannot. Compared to other automatic introspection tool generation techniques, Shadow Contexthas two merits: (1) Its overhead is significantly less. It achieves close-to-real time VMI. (2) It significantly improves the practical usefulness of introspection tools by allowing one introspection program to inspect a variety of guest OS versions. These merits are achieved via a new concept called "Shadow Context" which allows the guest OSessystem call code to be reused inside a "shadowed" portion of the context of the out-of-guest inspection program. Besides, Shadow Context is secure enough to defend against a variety of real world attacks. Shadow Context is designed, implemented and systematically evaluated. Experimental results show that the performance overhead is about 75%with a median initialization time of 0.117 milliseconds.
  • Keywords
    inspection; operating systems (computers); security of data; virtual machines; OS versions; ShadowContext; VMI techniques; automatic introspection tool generation techniques; customized introspection programs; customized introspection tools; guest OSes system call code; introspection program; manual-effort-free VMI; out-of-guest inspection program; real world attacks; real-world virtual machine introspection needs; shadowed portion; system call redirection; Context; Kernel; Malware; Monitoring; Semantics; Virtual machining; Virtual Machine Introspection; Virtualization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on
  • Conference_Location
    Atlanta, GA
  • Type

    conf

  • DOI
    10.1109/DSN.2014.59
  • Filename
    6903612