T-VMI: Trusted Virtual Machine Introspection in Cloud Environments

被引:9
|
作者
Jia, Lina [1 ]
Zhu, Min [1 ]
Tu, Bibo [1 ]
机构
[1] Univ Chinese Acad Sci, Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Trusted VMI; TrustZone; Semantic Gap;
D O I
10.1109/CCGRID.2017.48
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the vulnerability of cloud environment exposed in security places Virtual Machine Introspection(VMI) at risk: once attackers subvert any layers of cloud environment, such as host, virtual machine manager(VMM) or qemu, VMI will be exposed undoubtedly to those attackers too. Nearly all existing VMI techniques implicitly assume that both VMM by which VMI accesses specific VM data and host which VMI is running on, are nonmalicious and immutable. Unfortunately, this assumption can be potentially violated with the growing shortage of security in cloud environment. Once VMM or host is exploited, attackers can tamper the code or hijack the data of VMI, then, falsify VM information and certifications to Cloud system's administrators who try to make sure the security of specific VM in certain compute node. This paper proposes a new trusted VMI monitor frame: T-VMI, which can avoid the malicious subversion of the routine of VMI. T-VMI guarantees the integrity of VMI code using isolation and the correctness of VMI data using high privilege level instruction and appropriate trap mechanism. This model is evaluated on a simulation environment by using ARM Foundation Model 8.0 and has been presented on a real development ARMv8 JUNO-r0 board. We finished the comprehensive experiments including effectiveness and performance, and the result and analysis show T-VMI has achieved the aim of expected effectiveness with acceptable performance cost.
引用
收藏
页码:478 / 487
页数:10
相关论文
共 50 条
  • [1] VMI-PL: A monitoring language for virtual platforms using virtual machine introspection
    Westphal, Florian
    Axelsson, Stefan
    Neuhaus, Christian
    Polze, Andreas
    DIGITAL INVESTIGATION, 2014, 11 : S85 - S94
  • [2] CryptVMI: Encrypted Virtual Machine Introspection in the Cloud
    Yao, Fangzhou
    Campbell, Roy H.
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 977 - 978
  • [3] CloudVMI: Virtual Machine Introspection as a Cloud Service
    Baek, Hyun-wook
    Srivastava, Abhinav
    Van der Merwe, Jacobus
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 153 - 158
  • [4] Virtual Machine Introspection based Cloud Monitoring Platform
    Lauren, Samuel
    Leppanen, Ville
    COMPUTER SYSTEMS AND TECHNOLOGIES (COMPSYSTECH'18), 2018, 1641 : 104 - 109
  • [5] CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection
    Qiang, Weizhong
    Xu, Gongping
    Dai, Weiqi
    Zou, Deqing
    Jin, Hai
    IEEE ACCESS, 2017, 5 : 21962 - 21976
  • [6] Trusted virtual machine management model for cloud computing
    Zhou, Zhen-Ji
    Wu, Li-Fa
    Hong, Zheng
    Lai, Hai-Guang
    Zheng, Cheng-Hui
    1600, Editorial Board of Journal on Communications (35): : 94 - 105
  • [7] Towards virtual machine introspection based security framework for cloud
    Borisaniya, Bhavesh
    Patel, Dhiren
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (02):
  • [8] Performance Analysis of Virtual Machine Introspection Tools in Cloud Environment
    Ainapure, Bharati
    Shah, Deven
    Rao, A. Ananda
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [9] Towards virtual machine introspection based security framework for cloud
    Bhavesh Borisaniya
    Dhiren Patel
    Sādhanā, 2019, 44
  • [10] CryptVMI: A Flexible and Encrypted Virtual Machine Introspection System in the Cloud
    Yao, Fangzhou
    Sprabery, Read
    Campbell, Roy H.
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 11 - 17