Virtual Machine Security Systems
نویسندگان
چکیده
Current operating systems provide the process abstraction to achieve resource sharing and isolation. From a security perspective, however, an attacker who has compromised one process can usually gain control of the entire machine. This makes security systems running on the same computer, such as anti-virus programs or intrusion detection systems, also vulnerable to attack. In response to the imperfect isolation between processes in modern operating systems, security researchers have begun to use virtual machine technology when designing security systems. A virtual machine makes raw device requests to a set of devices that are emulated by underlying software. So, software running in a VM has the appearance of its own dedicated hardware, but is actually controlled and managed by a software layer on the physical computer. With reasonable assumptions, the level of isolation between virtual machines is nearly equivalent to having two separate machines. At the same time, the underlying software has full access to each virtual machine’s state. These properties make virtual machines very attractive for designers of security systems. In this chapter we explore a wide variety of security applications that utilize virtual machine technology, including intrusion detection and introspection, honeyfarms, logging and replaying, secure file systems, and even malicious software.
منابع مشابه
A Survey on Techniques of Secure Live Migration of Virtual Machine
Live migration is an essential feature of virtualization that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. Unfortunately the disclosed vulnerabilities with the live migration pose...
متن کاملSecurity Architecture for Virtual Machines
We propose security architecture based on virtual machine monitor to efficiently deal with attacks on virtual machines. We will show that our model is capable of detecting suspicious processes running in the virtual machine, can detect and prevent different types of attacks including zero day attacks by monitoring the virtual machine traffic and the processes that are generating or receiving th...
متن کاملCentralized Security Policy Support for Virtual Machine
For decades, researchers have pointed out that Mandatory Access Control (MAC) is an effective method to protect computer systems from being misused. Unfortunately, MAC is still not widely deployed because of its complexity. The problem is even worse in a virtual machine environment, because the current architecture is not designed to support MAC in a site-wide manner: machines with multiple vir...
متن کاملAn Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments
As virtual machines become increasingly commonplace as a method of separating hostile or hazardous code from commodity systems, the potential security exposure from implementation flaws has increased dramatically. This paper investigates the state of popular virtual machine implementations for x86 systems, employing a combination of source code auditing and blackbox random testing to assess the...
متن کاملRoViM: Rotating Virtual Machines for Security and Fault-Tolerance
Nowadays, the field of embedded system experiences a number of changes. On one hand, recent cyber attacks against safety-critical systems demonstrate that malware can force safetycritical systems to endanger human lives and harm the environment. Therefore, a new requirement of security have arisen for safety-critical and embedded systems. However, security should be designed hand in hand with s...
متن کامل