Secure Observation of Kernel Behavior
نویسندگان
چکیده
Operating system kernels are difficult to understand and monitor. Hardware virtualization provides a layer where security tools can observe a kernel, but the gap between operating system abstractions and hardware accesses limits the ability of tools to comprehend the kernel’s activity. Virtual machine introspection (VMI) builds knowledge of high-level kernel state by directly accessing the memory of an executing kernel. We show that implementations of introspection-based tools unsafely rely on operating system level data structures to provide meaningful information about a guest. We evade XenAccess, an open source implementation of introspection developed for Xen. We then develop Wizard, a Xen-based kernel monitor cognizant of the semantic correlation between events at a high-level kernel service interface and events at a low-level hardware device interface. In contrast to VMI, Wizard trusts no guest OS data, but its semantic understanding still identifies kernel-level attacks that alter the kernel’s execution behavior. Wizard’s monitoring imposes modest overheads of 0%–25% on guest applications.
منابع مشابه
Process of Effect of Language Development on Behavior Problems in Children with Cochlear Implanted: the Mediating role of Private Speech and Self-Regulation
Objective: The main purpose of this study is to predict behavior problems by language development and secure attachment based on mediation role of self-regulation in cochlear implanted children. Method: In this correlation study 114 available cochlear implanted children in the age range of 3-7 years that at least one year has passed from the Cochlear Implant program were selected with available...
متن کاملThe Design of a COTSReal-Time Distributed Security Kernel
This paper describes the design of a security kernel called TTCB, which has innovative features. Firstly, it is a distributed subsystem with its own secure network. Secondly, the TTCB is real-time, that is, a synchronous subsystem capable of timely behavior. These two characteristics together are uncommon in security kernels. Thirdly, the TTCB can be implemented using only COTS components. We d...
متن کاملرابطه ساده و چندگانه تئوری ذهن، خودتنظیمی هیجانی و سبک های دلبستگی (ایمن و ناایمن) با بیانضباطی در دانش آموزان دختر سال سوم دبیرستان های شهر اهواز
Background & Aims: School indiscipline is a multi-faceted phenomenon that has many adverse effects on satisfaction from teaching and learning of students. This study examines the important antecedents theory of mind, self-regulation and emotional attachment styles in creating indiscipline behavior is. Materials & Methods: This study descriptive correlational study was conducted on junior hig...
متن کاملA Veri able Secure Distributed System
This paper presents a design for a veriiable secure distributed system. Based on the secure distributed system of Rushby and Randell, the desgin is presented as a hierarchy of levels implementing a set of virtual machines, where each level can be separately veriied for correctness with respect to the speciication and security policy. The heart of the system is based on Bevier's veriied kernel, ...
متن کاملSlic : Secure Loadable Interposition
This paper presents a method for extending operating system functionality in a way that is secure, eecient, simple, requires no kernel source changes, and is compatible with existing application binaries. Our approach is to enable extensions of the system call interface by loading a device driver into the kernel that redirects system calls to extension code running either in the kernel or in a ...
متن کامل