Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments

نویسندگان

  • Irfan Ahmed
  • Aleksandar Zoranic
  • Salman Javaid
  • Golden G. Richard
  • Vassil Roussev
چکیده

An interrupt descriptor table (IDT) is used by the processor to transfer the execution of a program to special software routines that handle interrupts, which might be raised during the normal course of operation by hardware or to signal exceptional conditions, such as a hardware failure. Attackers frequently modify the pointers in the IDT in order to execute malicious code. In this paper we present IDTchecker, which provides a comprehensive rulebased approach to check the integrity of the IDT and the corresponding interrupt handling code, based on a particular scenario commonly found in cloud environments. In this scenario, multiple virtual machines (VMs) run the same version of an OS kernel, which implies that IDT related code should also be identical across the pool of VMs. IDTchecker uses this scenario to compare the IDTs and the corresponding interrupt handlers across the VMs for any inconsistencies, based on a pre-defined set of rules. We thoroughly evaluate the effectiveness and runtime performance of IDTchecker and find that it can detect any change in the IDT or interrupt handling code without having any significant impact on a guest VMs’ system resources. Moreover, IDTchecker itself has a very small memory footprint (i.e. 10-15MB).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.dvi

More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity check...

متن کامل

Provenance based data integrity checking and verification in cloud environments

Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user's data is moved into re...

متن کامل

Distributed Provable Data Possession in Multi-Cloud Storage through Client Authentication

Identity-Based Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing construction of an efficient scheme for distributed cloud storage to support the scalability of service and data migration, in which of multiple cloud service providers to cooperatively store and maintain the clients’ data. Cloud computing has become an important thing in compu...

متن کامل

Identity Based Distributed Provable Data Possession in Multi Cloud Storage

loud computing has become an important thing in computer field. Cloud computing takes information processing as a service, such as storage and computing. Data integrity is important thing in cloud storage. In certain situations, clients should store their data such as image or text in multi cloud. When the client stores his/her data on multi-cloud servers, the distributed storage and integrity ...

متن کامل

Identity-Based Integrity Verification using PDP in Multi Cloud Storage

Cloud computing has become an important thing in computer field. Cloud computing takes information processing as a service, such as storage and computing. Data integrity is important thing in cloud storage. In certain situations, clients should store their data such as image or text in multi cloud. When the client stores his/her data on multicloud servers, the distributed storage and integrity ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013