Systemwall: An isolated firewall using hardware-based memory introspection

被引:1
|
作者
机构
[1] Biedermann, Sebastian
[2] Szefer, Jakub
来源
关键词
Dedicated hardware - Hardware-based approach - Malicious codes - Network connection - Physical devices - Proposed architectures - Sensitive informations - Software entities;
D O I
10.1007/978-3-319-13257-0_16
中图分类号
学科分类号
摘要
Memory introspection can be a powerful tool for analyzing contents of a system’s memory for any malicious code. Current approaches based on memory introspection have focused on Virtual Machines and using a privileged software entity, such as a hypervisor, to perform the introspection. Such software-based introspection, however, is susceptible to variety of attacks that may compromise the hypervisor and the introspection code. Furthermore, a hypervisor setup is not always wanted. In this work, we present a hardware-based approach to memory introspection. Dedicated hardware is introduced to read and analyze memory of the target system, independent of any hypervisor or OSes running on the system. We apply the new hardware approach to memory introspection to built-up an architecture that uses DMA and fine-grained memory introspection techniques in order to match network connections to the application-layer while being isolated and undetected from the operating system or the hypervisor. We call the proposed architecture SystemWall since it can be a standalone physical device which can be added as an expansion card to the mother board or a dedicated external box. The architecture is transparent and cannot be manipulated or deactivated by potential malware on the target system. We use the SystemWall in the evaluation to analyze the target system for malicious code and prevent unknown (malicious) applications from establishing network connections which can be used to spread viruses, spam or malware and to leak sensitive information. © Springer International Publishing Switzerland 2014.
引用
下载
收藏
相关论文
共 50 条
  • [21] Evaluation of hardware-based stride and sequential prefetching in shared-memory multiprocessors
    Dahlgren, F
    Stenstrom, P
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 1996, 7 (04) : 385 - 398
  • [22] UMH: A Hardware-Based Unified Memory Hierarchy for Systems with Multiple Discrete GPUs
    Ziabari, Amir Kavyan
    Sun, Yifan
    Ma, Yenai
    Schaa, Dana
    Abellan, Jose L.
    Ubal, Rafael
    Kim, John
    Joshi, Ajay
    Kaeli, David
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2016, 13 (04)
  • [23] Reconfigurable Hardware-based Genome Aligner Using Quality Scores
    Gok, M. Yagmur
    Sagiroglu, Mahmut S.
    Unsalan, Cem
    Goren, Sezer
    2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [24] Hardware-Based Implementation of Algorithms for Data Replacement in Cache Memory of Processor Cores
    Titarenko, Larysa
    Kharchenko, Vyacheslav
    Puidenko, Vadym
    Perepelitsyn, Artem
    Barkalov, Alexander
    COMPUTERS, 2024, 13 (07)
  • [25] Technology of implementation firewall based on hardware
    2000, Shanghai Comp Soc, China (26):
  • [26] Circuit synthesis evolution using a hardware-based genetic algorithm
    Abielmona, R
    Groza, V
    CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING 2001, VOLS I AND II, CONFERENCE PROCEEDINGS, 2001, : 963 - 968
  • [27] Algorithms for hardware-based pattern recognition
    Lohweg, Volker
    Diederichs, Carsten
    Müller, Dietmar
    Eurasip Journal on Applied Signal Processing, 2004, 2004 (12): : 1912 - 1920
  • [28] Flexible Hardware-Based Stereo Matching
    Ambrosch, Kristian
    Kubinger, Wilfried
    Humenberger, Martin
    Steininger, Andreas
    EURASIP JOURNAL ON EMBEDDED SYSTEMS, 2008, (01)
  • [29] Hardware-based networking widens the pipes
    Ortiz, S
    COMPUTER, 1998, 31 (05) : 8 - 9
  • [30] Plugging hardware-based compression into a server
    不详
    EDN, 2007, 52 (24) : 30 - 30