A Software Vulnerability Analysis Environment Based on Virtualization Technology

被引:1
|
作者
Wang Chunlei [1 ]
Wen Yan [2 ]
Dai Yiqi [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Beijing Inst Syst Engn, Dept Network Res, Beijing, Peoples R China
关键词
vulnerability analysis; virtual machine; software security; virtualization execution environment; INTRUSION DETECTION;
D O I
10.1109/WCINS.2010.5541854
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The accurate identification and effective analysis of software vulnerabilities depends on flexible and extensible analysis environment. However, current research work cannot provide highly available environment supporting for different types of vulnerabilities. Aiming at the problem, this paper proposes a novel method for constructing software vulnerability analysis environment based upon virtualization technique, defines the system level simulation model for vulnerability analysis, and describes the simulation model based vulnerability analysis method. Based upon the simulation model and analysis method, we have designed and implemented the Virtualization-based Vulnerability Analysis Environment (VirtualVAE), which can examine the operation behaviors of guest operation system and applications at hardware level, and analyze the operation process of sensitive data in the whole system. Therefore, it can accurately simulate a wide variety of system behaviors, and provide dynamic analysis capabilities for different types of vulnerabilities. The experimental results show that it provides a flexible environment for accurately identifying and analyzing the vulnerabilities of software systems.
引用
收藏
页码:620 / +
页数:2
相关论文
共 50 条
  • [1] The Use of Virtualization Technology in the Dynamic Analysis of Software Code
    Chernov, A. Yu.
    Konoplev, A. S.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 834 - 837
  • [2] Software Virtualization Environment Enhances Control
    Hartman, Kim
    [J]. CONTROL ENGINEERING, 2009, 56 (10) : M12 - M14
  • [3] Android software vulnerability mining framework based on dynamic taint analysis technology
    Zhao Min
    Yang Haimin
    Chen Ping
    Yang Zhengxing
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2112 - 2115
  • [4] Cloud Security Analysis Based on Virtualization Technology
    Zhang, Jiaxing
    [J]. 2022 INTERNATIONAL CONFERENCE ON BIG DATA, INFORMATION AND COMPUTER NETWORK (BDICN 2022), 2022, : 519 - 522
  • [5] Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management
    Perez, Alberto Garcia
    Martinez, Antonio Lopez
    Perez, Manuel Gil
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 219
  • [6] JOINTLY DEVELOPED SOFTWARE FOR CPU VIRTUALIZATION TECHNOLOGY
    不详
    [J]. ELECTRONICS WORLD, 2011, 117 (1897): : 50 - 50
  • [7] Benefit of Construct Information Security Environment Based on Lightweight Virtualization Technology
    Wang, Jen-Chieh
    Cheng, Wei-Fun
    Chen, Han-Chiang
    Chien, Hung-Li
    [J]. 49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 273 - 276
  • [8] A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
    WANG Juan
    LIN Wutao
    LI Haoyu
    DU Bianxia
    MENG Ke
    WANG Jiang
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 379 - 384
  • [9] Open access for ALICE analysis based on virtualization technology
    Buncic, P.
    Gheata, M.
    Schutz, Y.
    [J]. 21ST INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP2015), PARTS 1-9, 2015, 664
  • [10] Research on the Virtualization Technology in Cloud Computing Environment
    Ding, Weimin
    Ghansah, Benjamin
    Wu, Yanyan
    [J]. INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH IN AFRICA, 2016, 21 : 191 - 196