Nitro: Hardware-Based System Call Tracing for Virtual Machines

被引:0
|
作者
Pfoh, Jonas [1 ]
Schneider, Christian [1 ]
Eckert, Claudia [1 ]
机构
[1] Tech Univ Munich, Munich, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Virtual machine introspection (VMI) describes the method of monitoring and analyzing the state of a virtual machine from the hypervisor level. This lends itself well to security applications, though the hardware virtualization support from Intel and AMD was not designed with VMI in mind. This results in many challenges for developers of hardware-supported VMI systems. This paper describes the design and implementation of our prototype framework, Nitro, for system call tracing and monitoring. Since Nitro is a purely VMI-based system, it remains isolated from attacks originating within the guest operating system and is not directly visible from within the guest. Nitro is extremely flexible as it supports all three system call mechanisms provided by the Intel x86 architecture and has been proven to work in Windows, Linux, 32-bit, and 64-bit environments. The high performance of our system allows for real-time capturing and dissemination of data without hindering usability. This is supported by extensive testing with various guest operating systems. In addition, Nitro is resistant to circumvention attempts due to a construction called hardware rooting. Finally, Nitro surpasses similar systems in both performance and functionality.
引用
收藏
页码:96 / 112
页数:17
相关论文
共 50 条
  • [1] Supporting Trusted Virtual Machines with Hardware-Based Secure Remote Memory
    Heo, Taekyung
    Kang, Seunghyo
    Lee, Sanghyeon
    Hwang, Soojin
    Park, Joongun
    Huh, Jaehyuk
    [J]. PROCEEDINGS OF THE 2024 ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON MEMORY MANAGEMENT, ISMM 2024, 2024, : 43 - 56
  • [2] Hardware-based On-line Intrusion Detection via System Call Routine Fingerprinting
    Zhou, Liwei
    Makris, Yiorgos
    [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1546 - 1551
  • [3] Call String Sensitivity for Hardware-Based Hybrid WCET Analysis
    Dreyer, Boris
    Hochberger, Christian
    Wegener, Simon
    [J]. IEEE EMBEDDED SYSTEMS LETTERS, 2022, 14 (02) : 91 - 94
  • [4] Hardware-Based Runtime Verification with Embedded Tracing Units and Stream Processing
    Convent, Lukas
    Hungerecker, Sebastian
    Scheffel, Torben
    Schmitz, Malte
    Thoma, Daniel
    Weiss, Alexander
    [J]. RUNTIME VERIFICATION (RV 2018), 2018, 11237 : 43 - 63
  • [5] A hardware-based algorithm for virtual machine provisioning in a private cloud
    Amol Jaikar
    Gyeong-Ryoon Kim
    Dada Huang
    Seo-Young Noh
    [J]. Journal of Central South University, 2014, 21 : 4291 - 4295
  • [6] A Hardware-Based Correct Execution Environment Supporting Virtual Memory
    Lee, Daehyeon
    Shin, Ohsuk
    Cha, Yeonghyeon
    Lee, Junghee
    Yun, Taisic
    Kim, Jihye
    Oh, Hyunok
    Nicopoulos, Chrysostomos
    Lee, Sang Su
    [J]. IEEE ACCESS, 2024, 12 : 114008 - 114022
  • [7] A hardware-based algorithm for virtual machine provisioning in a private cloud
    Amol JAIKAR
    Gyeong-Ryoon KIM
    Dada HUANG
    Seo-Young NOH
    [J]. Journal of Central South University, 2014, 21 (11) : 4291 - 4295
  • [8] A hardware-based algorithm for virtual machine provisioning in a private cloud
    Jaikar, Amol
    Kim, Gyeong-Ryoon
    Huang, Dada
    Noh, Seo-Young
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2014, 21 (11) : 4291 - 4295
  • [9] Addressing virtual reality misclassification: A hardware-based qualification matrix for virtual reality technology
    Takac, Marcel
    Collett, James
    Conduit, Russell
    De Foe, Alexander
    [J]. CLINICAL PSYCHOLOGY & PSYCHOTHERAPY, 2021, 28 (03) : 538 - 556
  • [10] A Hardware-Based Caching System on FPGA NIC for Blockchain
    Sakakibara, Yuma
    Morishima, Shin
    Nakamura, Kohei
    Matsutani, Hiroki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (05) : 1350 - 1360