ReVirt: Enabling intrusion analysis through virtual-machine logging and replay

被引:237
|
作者
Dunlap, GW [1 ]
King, ST [1 ]
Cinar, S [1 ]
Basrai, MA [1 ]
Chen, PM [1 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
关键词
D O I
10.1145/1060289.1060309
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze attacks that include any non-deterministic events. ReVirt removes the dependency on the target operating system by moving it into a virtual machine and logging below the virtual machine. This allows ReVirt to replay the system's execution before, during, and after an intruder compromises the system, even if the intruder replaces the target operating system. ReVirt logs enough information to replay a long-term execution of the virtual machine instruction-by-instruction. This enables it to provide arbitrarily detailed observations about what transpired on the system, even in the presence of non-deterministic attacks and executions. ReVirt adds reasonable time and space overhead. Overheads due to virtualization are imperceptible for interactive use and CPU-bound workloads, and 13-58% for kernel-intensive workloads. Logging adds 0-8% overhead, and logging traffic for our workloads can be stored on a single disk for several months.
引用
收藏
页码:211 / 224
页数:14
相关论文
共 17 条
  • [1] Delta Encoding of Virtual-Machine Memory in the Dynamic Analysis of Malware
    Fowler, James E.
    2016 DATA COMPRESSION CONFERENCE (DCC), 2016, : 592 - 592
  • [2] Analysis of Virtual Machine Record and Replay for Trustworthy Computing
    Grizzard, Julian B.
    Gardner, Ryan W.
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2013, 32 (02): : 528 - 535
  • [3] Analysis of virtual machine record and replay for trustworthy computing
    Grizzard, Julian B.
    Gardner, Ryan W.
    Johns Hopkins APL Technical Digest (Applied Physics Laboratory), 2013, 32 (02): : 528 - 535
  • [4] HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation
    Lin, Kunli
    Liu, Wenqing
    Zhang, Kun
    Tu, Bibo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 2925 - 2938
  • [5] Java']Java virtual-machine support for portable worst-case execution-time analysis
    Bate, I
    Bernat, G
    Puschner, P
    ISORC 2002: FIFTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2002, : 83 - 90
  • [6] Hierarchical RAID's Parity Generation using Pass-through GPU in Multi Virtual-Machine Environment
    Song, Tae-Gun
    Pirahandeh, Mehdi
    Kim, Deok-Hwan
    2016 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2016, : 386 - 389
  • [7] SECURING VIRTUAL EXECUTION ENVIRONMENTS THROUGH MACHINE LEARNING-BASED INTRUSION DETECTION
    Azmandian, Fatemeh
    Kaeli, David R.
    Dy, Jennifer G.
    Aslam, Javed A.
    2015 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING, 2015,
  • [8] Enabling Virtual Met Masts for wind energy applications through machine learning-methods
    Schwegmann, Sandra
    Faulhaber, Janosch
    Pfaffel, Sebastian
    Yu, Zhongjie
    Doerenkaemper, Martin
    Kersting, Kristian
    Gottschall, Julia
    ENERGY AND AI, 2023, 11
  • [9] Analysis of a Moon outpost for Mars enabling technologies through a Virtual Reality environment
    Casini, Andrea E. M.
    Maggiore, Paolo
    Viola, Nicole
    Basso, Valter
    Ferrino, Marinella
    Hoffman, Jeffrey A.
    Cowley, Aidan
    ACTA ASTRONAUTICA, 2018, 143 : 353 - 361
  • [10] Enabling Human-Machine Interaction in Projected Virtual Environments Through Camera Tracking of Imperceptible Markers
    Celozzi, Cesare
    Lamberti, Fabrizio
    Paravati, Gianluca
    Sanna, Andrea
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2013, 29 (08) : 549 - 561