期刊导航

论文摘要

一种采用硬件虚拟化的内核数据主动保护方法

AnActiveProtectionofKernelDataUsingHardware-assistedVirtualization

作者:傅建明(武汉大学 空天信息安全与可信计算教育部重点实验室;武汉大学计算机学院;武汉大学软件工程国家重点实验室);沙乐天(武汉大学 空天信息安全与可信计算教育部重点实验室;武汉大学计算机学院);李鹏伟(武汉大学 空天信息安全与可信计算教育部重点实验室;武汉大学计算机学院);彭国军(武汉大学 空天信息安全与可信计算教育部重点实验室;武汉大学计算机学院)

Author:Fu Jianming(KeyLab.ofAerospaceInfo.SecurityandTrustedComputing of Ministry of Education,WuhanUniv.;SchoolofComputer,WuhanUniv.;KeyLab.ofSoftwareEng.,WuhanUniv.);Sha Letian(KeyLab.ofAerospaceInfo.SecurityandTrustedComputing of Ministry of Education,WuhanUniv.;SchoolofComputer,WuhanUniv.);Li Pengwei(KeyLab.ofAerospaceInfo.SecurityandTrustedComputing of Ministry of Education,WuhanUniv.;SchoolofComputer,WuhanUniv.);Peng Guojun(KeyLab.ofAerospaceInfo.SecurityandTrustedComputing of Ministry of Education,WuhanUniv.;SchoolofComputer,WuhanUniv.)

收稿日期:2013-06-19          年卷(期)页码:2014,46(1):8-13

期刊名称:工程科学与技术

Journal Name:Advanced Engineering Sciences

关键字:硬件虚拟化;内核数据完整性;Rootkit检测

Key words:hardwarevirtualization;kerneldataintegrity;Rootkitdetection

基金项目:国家自然科学基金资助项目(61202387;90718005);高等学校博士学科点专项科研基金资助项目(20120141110002)

中文摘要

为保护操作系统内核的完整性,提出了一种基于硬件虚拟化技术的保护方案。该方法对关键寄存器、代码指针表、函数代码等恶意代码攻击的关键点进行识别和放入保护区,利用硬件虚拟化的自动陷入机制检测对保护区的非法篡改。同时,利用单步执行技术和事件转发技术保障OS其它操作的兼容性。另外,通过保护页的合并减少保护区的长度以提高异常处理的效率。最后,实现了一个采用该技术的原型工具——HV_KDAP,该工具检测了主流的9款Rootkit样本,实验结果证实其增加的负载为12.7%。该工具还可以抑制内核本地权限提升的攻击,以及用于内核攻击的取证。

英文摘要

In order to protect the integrity of operating system kernel files,a method of active protection of kernel data was proposed based on hardware-assisted virtualization.The method recognizes the key points of some registers,code pointers, and function codes,which are often attacked by malicious codes,and maps these points into a protection table,and then it can avoid kernel modification through R/W bit of PTE.At the same time,single step execution is used to legally write data in protected points,and events injection keeps the compatibility of operation system.In addition,continuous pages in the protection table are merged to reduce the size of the protection table and improve the efficiency.Finally,based on this method,a prototype system,called HV_KDAP,was designed and implemented.HV_KDAP can detect 9 kinds of Rootkits,which contain popular techniques in Rootkit,and its overhead is about 12.7%.Moreover,HV_KDAP can also detect the attacking of local privilege escalation exploiting,and be applied to the kernel forensics.

关闭

Copyright © 2020四川大学期刊社 版权所有.

地址:成都市一环路南一段24号

邮编:610065