Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/129971
DC FieldValueLanguage
dc.contributor資管系
dc.creator蕭舜文
dc.creatorHsiao, Shun-Wen 
dc.creator孫雅麗
dc.creator陳孟彰
dc.date2020-01
dc.date.accessioned2020-05-27-
dc.date.available2020-05-27-
dc.date.issued2020-05-27-
dc.identifier.urihttp://nccur.lib.nccu.edu.tw/handle/140.119/129971-
dc.description.abstractWith the advance of hardware, network, and virtualization technologies, cloud computing has prevailed and become the target of security threats such as the cross virtual machine (VM) side channel attack, with which malicious users exploit vulnerabilities to gain information or access to other guest virtual machines. Among the many virtualization technologies, the hypervisor manages the shared resource pool to ensure that the guest VMs can be properly served and isolated from each other. However, while managing the shared hardware resources, due to the presence of the virtualization layer and different CPU modes (root and non-root mode), when a CPU is switched to non-root mode and is occupied by a guest machine, a hypervisor cannot intervene with a guest at runtime. Thus, the execution status of a guest is like a black box to a hypervisor, and the hypervisor cannot mediate possible malicious behavior at runtime. To rectify this, we propose a hardware-assisted VMI (virtual machine introspection) based in-guest process monitoring mechanism which supports monitoring and management applications such as process profiling. The mechanism allows hooks placed within a target process (which the security expert selects to monitor and profile) of a guest virtual machine and handles hook invocations via the hypervisor. In order to facilitate the needed monitoring and/or management operations in the guest machine, the mechanism redirects access to in-guest memory space to a controlled, self-defined memory within the hypervisor by modifying the extended page table (EPT) to minimize guest and host machine switches. The advantages of the proposed mechanism include transparency, high performance, and comprehensive semantics. To demonstrate the capability of the proposed mechanism, we develop an API profiling system (APIf) to record the API invocations of the target process. The experimental results show an average performance degradation of about 2.32%, far better than existing simila...
dc.format.extent3290091 bytes-
dc.format.mimetypeapplication/pdf-
dc.relationIEEE Transactions on Information Forensics and Security
dc.titleHardware-Assisted MMU Redirection for In-guest Monitoring and API Profiling
dc.typearticle
dc.identifier.doi10.1109/TIFS.2020.2969514
dc.doi.urihttp://doi.org/10.1109/TIFS.2020.2969514
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.grantfulltextrestricted-
item.openairetypearticle-
Appears in Collections:期刊論文
Files in This Item:
File Description SizeFormat
426.pdf3.21 MBAdobe PDF2View/Open
Show simple item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.