HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code

被引:11
|
作者
Xiao, Jidong [1 ]
Lu, Lei [2 ]
Wang, Haining [3 ]
Zhu, Xiaoyun [4 ]
机构
[1] Boise State Univ, Boise, ID 83725 USA
[2] VMware Inc, Palo Alto, CA USA
[3] Univ Delaware, Newark, DE USA
[4] Futurewei Technol, Santa Clara, CA USA
关键词
D O I
10.1109/ICAC.2016.46
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Virtual Machine Introspection (VMI) is an approach to inspecting and analyzing the software running inside a virtual machine from the hypervisor. Similarly, memory forensics analyzes the memory snapshots or dumps to understand the runtime state of a physical or virtual machine. The existing VMI and memory forensic tools rely on up-to-date kernel information of the target operating system (OS) to work properly, which often requires the availability of the kernel source code. This requirement prevents these tools from being widely deployed in real cloud environments. In this paper, we present a VMI tool called HyperLink that partially retrieves running process information from a guest virtual machine without its source code. While current introspection and memory forensic solutions support only one or a limited number of kernel versions of the target OS, HyperLink is a one-for-many introspection and forensic tool, i.e., it supports most, if not all, popular OSes regardless of their versions. We implement both online and offline versions of HyperLink. We validate the efficacy of HyperLink under different versions of Linux, Windows, FreeBSD, and Mac OS X. For all the OSes we tested, HyperLink can successfully retrieve the process information in one minute or several seconds. Through online and offline analyses, we demonstrate that HyperLink can help users detect real-world kernel rootkits and play an important role in intrusion detection. Due to its version-agnostic property, HyperLink could become the first introspection and forensic tool that works well in autonomic cloud computing environments.
引用
收藏
页码:127 / 136
页数:10
相关论文
共 34 条
  • [21] Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations
    Thorpe, Sean
    Ray, Indrajit
    Grandison, Tyrone
    Barbir, Abbie
    France, Robert
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 97 - 112
  • [22] Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
    Fu, Yangchun
    Lin, Zhiqiang
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 586 - 600
  • [23] Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection
    Alruhaily, Nada
    Bordbar, Behzad
    Chothia, Tom
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 766 - 773
  • [24] Source Code Analysis for Static Prediction of Dynamic Memory Usage
    Kim, Sangwho
    Ryou, Jaecheol
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 46 - 49
  • [25] Multilevel analysis of the java']java virtual machine based on kernel and userspace traces
    Daoud, Houssem
    Dagenais, Michel
    JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 167
  • [26] KBP: Kernel Enhancements for Low-Latency Networking for Virtual Machine and Container without Application Customization
    Fujimoto, Kei
    Kaneko, Masashi
    Matsui, Kenichi
    Akutsu, Masayuki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2022, E105B (05) : 522 - 532
  • [27] Virtual Machine Security Monitoring Method Based on Physical Memory Analysis
    Yang, Shumian
    Wang, Lianhai
    Ge, Liang
    Zhang, Shuhui
    Liu, Guangqi
    WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 1137 - 1148
  • [28] Delta Encoding of Virtual-Machine Memory in the Dynamic Analysis of Malware
    Fowler, James E.
    2016 DATA COMPRESSION CONFERENCE (DCC), 2016, : 592 - 592
  • [29] One million (LOC) and counting: Static analysis for errors and vulnerabilities in the Linux kernel source code
    Breuer, Peter T.
    Pickin, Simon
    RELIABLE SOFTWARE TECHNOLOGIES - ADA - EUROPE 2006, PROCEEDINGS, 2006, 4006 : 56 - 70
  • [30] A systematic mapping study on graph machine learning for static source code analysis
    Maarleveld, Jesse
    Guo, Jiapan
    Feitosa, Daniel
    INFORMATION AND SOFTWARE TECHNOLOGY, 2025, 183