%0 Journal Article %T Approach of Kernel Integrity Monitoring Using Hardware Virtualization
一个基于硬件虚拟化的内核完整性监控方法 %A LI Xun %A HUANG Hao %A
李珣 %A 黄皓 %J 计算机科学 %D 2011 %I %X Kernel-level attacks compromise operating system security by tampering with critical data and control flow in the kernel. Current approaches defend against these attacks by applying code integrity or control flow integrity control methods. However, they focus on only a certain aspect and cannot give a complete integrity monitoring solution. This paper analyzed the kernel integrity principle and got practical rectuirements to ensure kernel integrity. Critical data objects effect operating system function directly. Only certain code is able to modify critical data objects at certain condidons to ensure data integrity. All factors about code execution sequence are protected and monitored to ensure control flow integrity. Implementation in Xen VMM(Virtual Machine Monitor) using hardware virtualization,or referred to as HVM(Hardware Virtual Machine) is introduced to protect and monitor Linux kernel. Experiments show that the solution can detect and prevent attacks and bugs compromising the kernel. %K Monitor %K VMM %K HVM %K Control flow integrity %K Data integrity
监控,虚拟机监控器,硬件虚拟化,控制流完整性,数据完整性 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=17DDCED190714E7922D008B78C011A5F&yid=9377ED8094509821&vid=16D8618C6164A3ED&iid=59906B3B2830C2C5&sid=68D88C2FCF9C3098&eid=AA76E167F386B6B3&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=0