A Software Vulnerability Analysis Environment Based on Virtualization Technology

被引:1
|
作者
Wang Chunlei [1 ]
Wen Yan [2 ]
Dai Yiqi [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] Beijing Inst Syst Engn, Dept Network Res, Beijing, Peoples R China
关键词
vulnerability analysis; virtual machine; software security; virtualization execution environment; INTRUSION DETECTION;
D O I
10.1109/WCINS.2010.5541854
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The accurate identification and effective analysis of software vulnerabilities depends on flexible and extensible analysis environment. However, current research work cannot provide highly available environment supporting for different types of vulnerabilities. Aiming at the problem, this paper proposes a novel method for constructing software vulnerability analysis environment based upon virtualization technique, defines the system level simulation model for vulnerability analysis, and describes the simulation model based vulnerability analysis method. Based upon the simulation model and analysis method, we have designed and implemented the Virtualization-based Vulnerability Analysis Environment (VirtualVAE), which can examine the operation behaviors of guest operation system and applications at hardware level, and analyze the operation process of sensitive data in the whole system. Therefore, it can accurately simulate a wide variety of system behaviors, and provide dynamic analysis capabilities for different types of vulnerabilities. The experimental results show that it provides a flexible environment for accurately identifying and analyzing the vulnerabilities of software systems.
引用
收藏
页码:620 / +
页数:2
相关论文
共 50 条
  • [41] Study on Construction of a Virtualization based Software Defined Network
    Qiao, Wen-Xin
    Lu, Yu
    Wang, Chang-Sheng
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND INFORMATION TECHNOLOGY PROCESSING (AMITP 2016), 2016, 60 : 10 - 15
  • [42] MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology
    Kim, Taehyoung
    Kim, Inhyuk
    Min, Changwoo
    Eom, Young Ik
    [J]. SECURITY TECHNOLOGY, DISASTER RECOVERY AND BUSINESS CONTINUITY, 2010, 122 : 134 - 141
  • [43] vCerberus:A DRTM System Based on Virtualization Technology
    CHEN Wenzhi
    [J]. Wuhan University Journal of Natural Sciences, 2010, 15 (03) : 185 - 189
  • [44] vCourse: A Course Platform Based on Virtualization Technology
    Liu, Yu
    Wang, Jinmo
    [J]. PROCEEDINGS OF THE 2013 CONFERENCE ON EDUCATION TECHNOLOGY AND MANAGEMENT SCIENCE (ICETMS 2013), 2013, : 902 - 905
  • [45] Research on Key Technology of Web Vulnerability Detection System Based on Cloud Environment
    Zhang, Zhen
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND HEALTH (ICSSH 2014), PT 4, 2014, 58 : 336 - 341
  • [46] Research on software process technology and environment
    Pan, Qiu-Ling
    Liu, Zong-Tian
    Jia, Liang
    Xu, Qing
    Yuan, Zhao-Shan
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2001, 29 (11): : 1575 - 1577
  • [47] Software-based Optical Access Network Virtualization Technology: Facilitating New-service Prototype Provisioning
    Suzuki, Takahiro
    [J]. NTT Technical Review, 2022, 20 (11): : 12 - 15
  • [48] Vulnerability Analysis of Software Defined Networking
    Zerkane, Salaheddine
    Espes, David
    Le Parc, Philippe
    Cuppens, Frederic
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 97 - 116
  • [49] Vulnerability analysis of GPS receiver software
    Gonzalez, G. Mori
    Petrunin, I.
    Zbikowski, R.
    Voutsis, K.
    Moreno, R. Verdeguer
    [J]. 2019 INTERNATIONAL CONFERENCE ON LOCALIZATION AND GNSS (ICL-GNSS), 2019,
  • [50] Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine
    Noorafiza, M.
    Maeda, H.
    Uda, R.
    Kinoshita, T.
    Shiratori, M.
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 83 - 89