Concurrent and Consistent Virtual Machine Introspection with Hardware Transactional Memory

被引:0
|
作者
Liu, Yutao [1 ]
Xia, Yubin [1 ]
Guan, Haibing [2 ]
Zang, Binyu [1 ]
Chen, Haibo [1 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Parallel & Distributed Syst, Shanghai Key Lab Scalable Comp & Syst, Shanghai 200030, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
关键词
ARCHITECTURE;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Virtual machine introspection, which provides tamper-resistant, high-fidelity "out of the box" monitoring of virtual machines, has many prominent security applications including VM-based intrusion detection, malware analysis and memory forensic analysis. However, prior approaches are either intrusive in stopping the world to avoid race conditions between introspection tools and the guest VM, or providing no guarantee of getting a consistent state of the guest VM. Further, there is currently no effective means for timely examining the VM states in question. In this paper, we propose a novel approach, called TxIntro, which retrofits hardware transactional memory (HTM) for concurrent, timely and consistent introspection of guest VMs. Specifically, TxIntro leverages the strong atomicity of HTM to actively monitor updates to critical kernel data structures. Then TxIntro can mount introspection to timely detect malicious tampering. To avoid fetching inconsistent kernel states for introspection, TxIntro uses HTM to add related synchronization states into the read set of the monitoring core and thus can easily detect potential infiight concurrent kernel updates. We have implemented and evaluated TxIntro based on Xen VMM on a commodity Intel Haswell machine that provides restricted transactional memory (RTM) support. To demonstrate the effectiveness of TxIntro, we implemented a set of kernel rootkit detectors using TxIntro. Evaluation results show that TxIntro is effective in detecting these rootkits, and is efficient in adding negligible performance overhead.
引用
收藏
页码:416 / 427
页数:12
相关论文
共 50 条
  • [31] HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code
    Xiao, Jidong
    Lu, Lei
    Wang, Haining
    Zhu, Xiaoyun
    2016 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC), 2016, : 127 - 136
  • [32] ByteSTM: Virtual Machine-Level Java']Java Software Transactional Memory
    Mohamedin, Mohamed
    Ravindran, Binoy
    Palmieri, Roberto
    COORDINATION MODELS AND LANGUAGES, COORDINATION 2013, 2013, 7890 : 166 - 180
  • [33] Removal of Conflicts in Hardware Transactional Memory Systems
    M. M. Waliullah
    Per Stenstrom
    International Journal of Parallel Programming, 2014, 42 : 198 - 218
  • [34] Adaptive Snoop Granularity and Transactional Snoop Filtering in Hardware Transactional Memory
    Atoofian, Ehsan
    CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2014, 37 (02): : 76 - 85
  • [35] Conflict Graph Based Hardware Transactional Memory
    Zeng, Kun
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 496 - 501
  • [36] Hardware Transactional Memory with Delayed-Committing
    Ichii, Sekai
    Tashiro, Saki
    Nunome, Atsushi
    Hirata, Hiroaki
    Shibayama, Kiyoshi
    3RD INTERNATIONAL CONFERENCE ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY (ACIT 2015) 2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND INTELLIGENCE (CSI 2015), 2015, : 154 - 161
  • [37] Core Reliability: Leveraging Hardware Transactional Memory
    Do, Sang Wook Stephen
    Dubois, Michel
    IEEE COMPUTER ARCHITECTURE LETTERS, 2018, 17 (02) : 105 - 108
  • [38] Efficient Transaction Nesting in Hardware Transactional Memory
    Liu, Yi
    Su, Yangming
    Zhang, Cui
    Wu, Mingyu
    Zhang, Xin
    Li, He
    Qian, Depei
    ARCHITECTURE OF COMPUTING SYSTEMS - ARCS 2010, PROCEEDINGS, 2010, 5974 : 138 - +
  • [39] Exploiting object structure in hardware transactional memory
    Khan, Behram
    Horsnell, Matthew
    Rogers, Ian
    Lujan, Mikel
    Dinn, Andrew
    Watson, Ian
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2009, 24 (05): : 303 - 315
  • [40] Improving Utilization of Hardware Signatures in Transactional Memory
    Choi, Woojin
    Draper, Jeffrey
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2230 - 2239