AIT: A method for operating system kernel function call graph generation with a virtualization technique

被引:0
|
作者
Jiao, Longlong [1 ]
Luo, Senlin [1 ]
Liu, Wangtong [1 ]
Pan, Limin [1 ]
机构
[1] Beijing Inst Technol, Informat Syst & Secur & Countermeasures Expt Ctr, Beijing 100081, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2020年 / 14卷 / 05期
关键词
Function call graph; operating system kernel; virtualization; system trap;
D O I
10.3837/tiis.2020.05.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Operating system (OS) kernel function call graphs have been widely used in OS analysis and defense. However, most existing methods and tools for generating function call graphs are designed for application programs, and cannot be used for generating OS kernel function call graphs. This paper proposes a virtualization-based call graph generation method called Acquire in Trap (AIT). When target kernel functions are called, AIT dynamically initiates a system trap with the help of a virtualization technique. It then analyzes and records the calling relationships for trap handling by traversing the kernel stacks and the code space. Our experimental results show that the proposed method is feasible for both Linux and Windows OSs, including 32 and 64-bit versions, with high recall and precision rates. AIT is independent of the source code, compiler and OS kernel architecture, and is a universal method for generating OS kernel function call graphs.
引用
收藏
页码:2084 / 2100
页数:17
相关论文
共 50 条
  • [1] VirtuOS: an operating system with kernel virtualization
    Nikolaev, Ruslan
    Back, Godmar
    SOSP'13: PROCEEDINGS OF THE TWENTY-FOURTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2013, : 116 - 132
  • [2] Function-call Network Reliability of Kernel in Android Operating System
    Sun, Pengfei
    lai, ZhongDe
    Yao, Anzhuo
    Yang, Shunkun
    Li, Daqing
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [3] Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
    de Oliveira, Daniela Alvim Seabra
    Wu, S. Felix
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 451 - 460
  • [4] Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph
    Cho, Mingi
    Jin, Hoyong
    An, Dohyeon
    Kwon, Taekyoung
    IEEE ACCESS, 2021, 9 : 157267 - 157277
  • [5] A Generation Model of Function Call Based on the Control Flow Graph
    Sun, Weizhen
    Du, Xiangyan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013, 2014, 250 : 513 - 520
  • [6] KSG: Augmenting Kernel Fuzzing with System Call Specification Generation
    Sun, Hao
    Shen, Yuheng
    Liu, Jianzhong
    Xu, Yiru
    Jiang, Yu
    PROCEEDINGS OF THE 2022 USENIX ANNUAL TECHNICAL CONFERENCE, 2022, : 351 - 365
  • [7] A Power System Operating Scenario Generation Method Based on Graph Representation Learning and Feature Guidance
    Chen, Zhiwei
    Wu, Yufeng
    Pan, Zhenning
    Yu, Tao
    Liu, Qianjin
    Huang, Wenqi
    Hou, Jiaxuan
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2024, 44 (24): : 9521 - 9532
  • [8] Research of path coverage generation techniques based function call graph
    Zhang, Zhi-Hua
    Mu, Yong-Min
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (08): : 1808 - 1811
  • [9] Understanding and Mitigating Twin Function Misuses in Operating System Kernel
    Gu, Jinyu
    Shi, Jiacheng
    Su, Haroran
    Li, Wentai
    Zang, Binyu
    Guan, Haibing
    Chen, Haibo
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (08) : 2181 - 2193
  • [10] A Malware and Variant Detection Method Using Function Call Graph Isomorphism
    Bai, Jinrong
    Shi, Qibin
    Mu, Shiguang
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019