Advertisement

Programming and Computer Software

, Volume 38, Issue 5, pp 276–280 | Cite as

The use of hardware virtualization in the context of information security

  • D. V. SilakovEmail author
Article

Abstract

The use of hardware virtualization for ensuring information security is discussed. A review of various approaches to improving the security of software systems based on virtualization is given. A review of possible scenarios of using virtualization by intruders is also presented. The application domains and limitations of the available solutions and perspectives of future development in the field are discussed.

Keywords

Virtual Machine Address Space Virtual Machine Monitor Antivirus Software Hardware Virtualization 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lipaev, V.V., Quality Control of Large Software Systems, Moscow: SINTEG, 2003 [in Russian].Google Scholar
  2. 2.
    Garfinkel, T., Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools, Proc. of the Internet Society’s 2003 Symposium on Network and Distributed System Security, 2003, pp. 163–176.Google Scholar
  3. 3.
    Popek, G.J. and Goldberg, R.P., Formal Requirements for Virtualizable Third Generation Architectures, Commun. ACM, 1974, vol. 17, no. 7, pp. 412–421.MathSciNetzbMATHCrossRefGoogle Scholar
  4. 4.
    Kasperski, K., Hardware Virtualization Unleashed, InsidePro, 2007; http://www.insidepro.com/kk/159/159r.shtml
  5. 5.
    Dinaburg, A., Royal, P., Sharif, M., and Lee, W., Ether: Malware Analysis via Hardware Virtualization Extensions, Proc. of the 15th ACM Conf. on Computer and Communications Security, 2008, pp. 51–62.Google Scholar
  6. 6.
    Krishnan, S., Snow, K.Z., and Monrose, F., Trail of Bytes: Efficient Support for Forensic Analysis, Proc. of the 17th ACM Conf. on Computer and Communications Security, 2010, pp. 50–60.Google Scholar
  7. 7.
    Garfinkel, T. and Rosenblum, M., A Virtual Machine Introspection Based Architecture for Intrusion Detection, Proc. of the Symposium on Network and Distributed System Security (NDSS’03), 2003; http://suif.stanford.edu/papers/vmi-ndss03.pdf
  8. 8.
    Jiang, X., Wang, X., and Xu, D., Stealthy Malware Detection Through VMM-Based “Out-of-the-Box” Semantic View Reconstruction, Proc. of the 14th ACM Conf. on Computer and Communications Security, 2007, pp. 128–138.Google Scholar
  9. 9.
    New VMware VMsafe Technology Allows the Virtual Datacenter to Be More Secure Than Physical Environments, Press release, 2007; http://www.vmware.com/company/news/releases/vmsafe-vmworld.html
  10. 10.
    Intel Trusted Execution Technology Architectural Overview, Intel White Paper, 2008; http://www.intel.com/technology/security/downloads/arch-overview.pdf
  11. 11.
    Strongin, G., Trusted Computing Using AMD “Pacifica” and “Precidio” Secure Virtual Machine Technology, Information Security Technical Report, 2005, vol. 10, no. 2, pp. 120–132.MathSciNetCrossRefGoogle Scholar
  12. 12.
    Wojtczuk, R., Rutkowska, J., and Tereshkin A., Another Way to Circumvent Intel Trusted Execution Technology, Invisible Things Lab. December, 2009; http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf
  13. 13.
    Wojtczuk R. and Rutkowska, J., Attacking Intel Trusted Execution Technology, Black Hat DC 2009; http://invisiblethingslab.com/resources/bh09dc/Attacking%20Intel%20TXT%20-%20paper.pdf
  14. 14.
    Embleton, S., Sparks, S., and Zou, C., SMM Rootkits: A New Breed of OS Independent Malware, Proc. of the 4th Int. Conf. on Security and Privacy in Communication Networks, Istanbul, Turkey, 2008, Article #11, pp. 1–12.Google Scholar
  15. 15.
    Wojtczuk, R. and Tereshkin A., Attacking Intel BIOS, Black Hat USA 2009; http://invisiblethingslab.com/resources/bh09usa/Attacking%20Intel%20BIOS.pdf
  16. 16.
    Wojtczuk, R. and Tereshkin A., Introducing Ring-3 Rootkits, Black Hat USA 2009; http://invisiblethingslab.com/resources/bh09usa/Ring%20-3%20Rootkits.pdf
  17. 17.
    Rutkowska, J., Subverting Vista Kernel for Fun and Profit, Black Hat USA 2006; http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Rutkowska.pdf
  18. 18.
    King, S.T., Chen, P.M., Wang, Y.M., Verbowski, C., Wang, H.J., and Lorch, J.R., SubVirt: Implementing Malware with Virtual Machines, Proc. of the 2006 IEEE Symposium on Security and Privacy, 2006, pp. 314–327.Google Scholar
  19. 19.
    Liguori, A., Debunking Blue Pill Myth, Interview to Virtualization.info. August, 2006; http://virtualization.info/en/news/2006/08/debunking-blue-pill-myth.html
  20. 20.
    Garfinkel, T., Adams, K., Warfield, A., and Franklin, J., Compatibility Is not Transparency: VMM Detection Myths and Realities, 11th Workshop on Hot Topics in Operating Systems (HotOS-XI), 2007; http://www.stanford.edu/~talg/papers/HOTOS07/vmm-detection-hotos07.pdf
  21. 21.
    Madnick, S.E. and Donovan, J.J., Application and Analysis of the Virtual Machine Approach to Information System Security and Isolation, Proc. of the Workshop on Virtual Computer Systems, ACM, 1973, pp. 210–224.Google Scholar
  22. 22.
    Attanasio, C.R., Markstein, P. W., and Phillips, Ray J., Penetrating an Operating System: A Study of VM/370 Integrity, IBM Systems Journal, 1976, vol. 15, pp. 102–116.CrossRefGoogle Scholar
  23. 23.
    Bourdonov, I.B., Kossatchev, A.S., and Kuliamin, V.V., “Security, Verification, and Conformance Theory,” in Materialy vtoroi mezhdunarodnoi nauchnoi konferentsii po problemam bezopasnosti i protivideistviya terrorizmu (Proc. of the Second Int. Conf. on Security Problems and Terrorism Counteractions), Moscow: MNTsMO, 2007, pp. 135–159.Google Scholar
  24. 24.
    Karger, P.A. and Watson, T.J., Is Your Virtual Machine Monitor Secure?, Materials of Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008, pp. 5–5.Google Scholar
  25. 25.
    Garfinkel, T. and Rosenblum, M., When Virtual is Harder Than Real: Security Challenges in Virtual Machine Based Computing Environments, 10th Workshop on Hot Topics in Operating Systems (HotOS-X), 2005; http://www.stanford.edu/~talg/papers/HOTOS05/virtual-harder-hotos05.pdf
  26. 26.
    Rutkowska, J., Security Challenges in Virtualized Environments, RSA Conference, 2008; http://www.invisiblethingslab.com/resources/rsa08/Security%20Challanges%20in%20Virtualized%20Enviroments%20-%20RSA2008.pdf
  27. 27.
    Wojtczuk, R., Adventures with a Certain Xen Vulnerability (In the PVFB Backend), Black Hat USA, 2008; http://invisiblethingslab.com/resources/misc08/xenfb-adventures-10.pdf
  28. 28.
    Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., and Ports, D.R.K., Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems, Proc. of the 13th Int. Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS XIII), 2008, pp. 2–13.Google Scholar
  29. 29.
    Iakovenko, P.N., A Transparent Mechanism for Serving System Calls, Trudy Instituta Sistemnogo Programmirovaniya, RAN, 2010, vol. 18, pp. 221–241.Google Scholar
  30. 30.
    Burdonov, I., Kosachev, A., and Iakovenko, P., Virtualization-Based Separation of Privilege: Working with Sensitive Data in Untrusted Environment, Proc. of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 2009, pp. 1–6.Google Scholar
  31. 31.
    Qubes Architecture Specification, Version 0.3, 2010; http://qubesos.org/files/doc/arch-spec-0.3.pdf

Copyright information

© Pleiades Publishing, Ltd. 2012

Authors and Affiliations

  1. 1.Institute for System ProgrammingRussian Academy of SciencesMoscowRussia

Personalised recommendations