首页 | 本学科首页   官方微博 | 高级检索  
     

一个基于硬件虚拟化的内核完整性监控方法
引用本文:李殉,黄皓. 一个基于硬件虚拟化的内核完整性监控方法[J]. 计算机科学, 2011, 38(12): 68-72
作者姓名:李殉  黄皓
作者单位:南京大学计算机科学与技术系软件新技术国家重点实验室 南京210093
基金项目:江苏省高技术项目(BE2008124); 国家自然科学创新群体项目(60721002)资助
摘    要:对操作系统内核的攻击就是通过篡改关键数据和改变控制流来危及操作系统的安全。已有的一些方法通过保护代码完整性或控制流完整性来抵御这些攻击,但是这往往只关注于某一个方面而没有给出一个完整的监控方法。通过对内核完整性概念的分析,得出了在实际系统中保证内核完整性需要的条件:保障数据完整性,影响系统功能的关键数据对象只能由指定的代码在特定情况下修改;保障控制流完整性,保护和监控影响代码执行序列改变的所有因素。并采用硬件虚拟化的Xen虚拟机监控器实现对Linux内核的保护和监控。实验结果证明,该方法能够阻止外来攻击和本身漏洞对内核的破坏。

关 键 词:监控,虚拟机监控器,硬件虚拟化,控制流完整性,数据完整性

Approach of Kernel Integrity Monitoring Using Hardware Virtualization
LI Xun,HUANG Hao. Approach of Kernel Integrity Monitoring Using Hardware Virtualization[J]. Computer Science, 2011, 38(12): 68-72
Authors:LI Xun  HUANG Hao
Affiliation:LI Xun HUANG Hao(National Key Laboratory for Novel Software,Department of Computer Science and Technology,Nanjing University,Nanjing 210093,China)
Abstract:Kernel-level attacks compromise operating system security by tampering with critical data and control flow in the kernel. Current approaches defend against these attacks by applying code integrity or control flow integrity control methods. However, they focus on only a certain aspect and cannot give a complete integrity monitoring solution. This paper analyzed the kernel integrity principle and got practical rectuirements to ensure kernel integrity. Critical data objects effect operating system function directly. Only certain code is able to modify critical data objects at certain condidons to ensure data integrity. All factors about code execution sequence are protected and monitored to ensure controlflow integrity. Implementation in Xen VMM(Virtual Machine Monitor) using hardware virtualization,or referred to as HVM(Hardware Virtual Machine) is introduced to protect and monitor Linux kernel. Experiments show that the solution can detect and prevent attacks and bugs compromising the kernel.
Keywords:Monitor   VMM   HVM   Control flow integrity   Data integrity
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号