A Software Detection Mechanism Based on SMM in Network Computing

被引:2
|
作者
Zhou, Lei [1 ]
Shu, Yang [1 ]
Wang, Guojun [2 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
关键词
Software detection; Memory forensics; SMM; Semantic gap; Security agent; ROOTKIT;
D O I
10.1007/978-3-319-49145-5_14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To guarantee the network computing system security, the effective method is illegal or malicious software detection. Most of the former researches implement it on OS kernel or hypervisor level. However, if the system is attacked by the ring 0 or ring 1 level risks, the OS kernel or hypervisor is unable to provide the trusted base, which may cause an incorrect result. To solve the shortcomings, we choose the System Management Mode (SMM) to build a trusted execution environment. The SMM is a special cpu mode in the x86 architecture, which could create a security and isolated area on firmware level for malicious attacks detection. In this paper, we remotely interrupt the local system, and design a secure module in SMM to obtain messages from registers and physical memory space. Those messages are used to back analyze the software executing code segment for further information comparing. Beside the local detection, we use remote attestation approach for verifying the secure module. Our approach resists the attack surface under the OS level, and advances state-of-the-art detecting transparently. Furthermore, the analysis process could implement in the server to reduce the overheads on the client platform.
引用
收藏
页码:134 / 143
页数:10
相关论文
共 50 条
  • [21] Pedestrian Target Detection Based on Attention Mechanism in Cloud Computing
    Zhao, Lihua
    Zeng, Fanjun
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, MACHINE LEARNING AND PATTERN RECOGNITION, IPMLP 2024, 2024, : 313 - 317
  • [22] Software Defined Networking-based Vehicular Adhoc Network with Fog Computing
    Truong, Nguyen B.
    Lee, Gyu Myoung
    Ghamri-Doudane, Yacine
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1202 - 1207
  • [23] Network software market share statistics and forecast model based on cloud computing
    Zhang, Xi-Xiang
    Li, Tao-Shen
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2011, 31 (SUPPL. 2): : 75 - 80
  • [24] Offload Strategy for Edge Computing in Satellite Networks Based on Software Defined Network
    Liu, Zhiguo
    Gui, Yuqing
    Wang, Lin
    Jiang, Yingru
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (01): : 863 - 879
  • [25] The Design and Realization of Software System for Network Printing Device Based on Cloud Computing
    Ding, Ya-Zhou
    Chen, Lian-Sheng
    Jing, Rong
    Wang, Tao
    Zhang, Yu-jing
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 1093 - 1098
  • [26] A Green Computing-based Algorithm in Software Defined Network with Enhanced Performance
    Mishra, Pooja
    Godfrey, W. Wilfred
    Kumar, Neetesh
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 953 - 958
  • [27] Optimization of Computing and Networking Resources of a Hadoop Cluster Based on Software Defined Network
    Khaleel, Ali
    Al-Raweshidy, Named
    IEEE ACCESS, 2018, 6 : 61351 - 61365
  • [28] Binary software vulnerability detection method based on attention mechanism
    Han, Wenjie
    Pang, Jianmin
    Zhou, Xin
    Zhu, Di
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1462 - 1466
  • [29] HMMs based masquerade detection for network security on with parallel computing
    Liu, Jia
    Duan, Miyi
    Li, Wenfa
    Tian, Xinguang
    COMPUTER COMMUNICATIONS, 2020, 156 : 168 - 173
  • [30] HOSPITAL NETWORK SECURITY INTRUSION DETECTION BASED ON DIGITAL COMPUTING
    Zhao, F.
    Zhang, Y. M.
    Zhao, D. Q.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 119 : 6 - 6