HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code

被引:11
|
作者
Xiao, Jidong [1 ]
Lu, Lei [2 ]
Wang, Haining [3 ]
Zhu, Xiaoyun [4 ]
机构
[1] Boise State Univ, Boise, ID 83725 USA
[2] VMware Inc, Palo Alto, CA USA
[3] Univ Delaware, Newark, DE USA
[4] Futurewei Technol, Santa Clara, CA USA
关键词
D O I
10.1109/ICAC.2016.46
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Virtual Machine Introspection (VMI) is an approach to inspecting and analyzing the software running inside a virtual machine from the hypervisor. Similarly, memory forensics analyzes the memory snapshots or dumps to understand the runtime state of a physical or virtual machine. The existing VMI and memory forensic tools rely on up-to-date kernel information of the target operating system (OS) to work properly, which often requires the availability of the kernel source code. This requirement prevents these tools from being widely deployed in real cloud environments. In this paper, we present a VMI tool called HyperLink that partially retrieves running process information from a guest virtual machine without its source code. While current introspection and memory forensic solutions support only one or a limited number of kernel versions of the target OS, HyperLink is a one-for-many introspection and forensic tool, i.e., it supports most, if not all, popular OSes regardless of their versions. We implement both online and offline versions of HyperLink. We validate the efficacy of HyperLink under different versions of Linux, Windows, FreeBSD, and Mac OS X. For all the OSes we tested, HyperLink can successfully retrieve the process information in one minute or several seconds. Through online and offline analyses, we demonstrate that HyperLink can help users detect real-world kernel rootkits and play an important role in intrusion detection. Due to its version-agnostic property, HyperLink could become the first introspection and forensic tool that works well in autonomic cloud computing environments.
引用
收藏
页码:127 / 136
页数:10
相关论文
共 34 条
  • [31] Malware Detection using Machine Learning Based Analysis of Virtual Memory Access Patterns
    Xu, Zhixing
    Ray, Sayak
    Subramanyan, Pramod
    Malik, Sharad
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 169 - 174
  • [32] Analysis and Mitigation of Low-Frequency Interactions Between the Source and Load Virtual Synchronous Machine in an Islanded Microgrid
    Guo, Jian
    Chen, Yandong
    Liao, Shuhan
    Wu, Wenhua
    Zhou, Leming
    Xie, Zhiwei
    Wang, Xiangyu
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2022, 69 (04) : 3732 - 3742
  • [33] Data-Layout Optimization based on Memory-Access-Pattern Analysis for Source-Code Performance Improvement
    Lakhdar, Riyane Sid
    Charles, Henri-Pierre
    Kooli, Maha
    PROCEEDINGS OF THE 23RD INTERNATIONAL WORKSHOP ON SOFTWARE AND COMPILERS FOR EMBEDDED SYSTEMS (SCOPES 2020), 2020, : 1 - 6
  • [34] Parallel shared-memory open-source code for simulations of transient problems using isogeometric analysis, implicit direction splitting and residual minimization (IGA-ADS-RM)
    Los, Marcin
    Paszynski, Maciej
    ADVANCES IN ENGINEERING SOFTWARE, 2024, 196