Abstract
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic gap. However, kernel data is very complex; an Operating System (OS) kernel contains thousands of data structures that have direct and indirect (pointer) relations between each other with no explicit integrity constraints. This complexity makes it impractical to use manual methods. In this paper, we present a new solution to systematically and efficiently solve the semantic gap for any OS, without any prior knowledge of the OS. We present: (i) KDD, a tool that systematically builds a precise kernel data definition for any C-based OS such as Windows and Linux. KDD generates this definition by performing points-to analysis on the kernel's source code to disambiguate the pointer relations. (ii) SVA, a security appliance that solves the semantic gap based on the generated definition, to systematically and externally map the virtual machines' physical memory and extract the runtime dynamic objects. We have implemented prototypes for KDD and SVA, and have performed different experiments to prove their effectiveness.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012 |
| Pages | 836-843 |
| Number of pages | 8 |
| DOIs | |
| Publication status | Published - 2012 |
| Externally published | Yes |
| Event | IEEE International Conference on Cloud Computing 2012 - Honolulu, United States of America Duration: 24 Jun 2012 → 29 Jun 2012 Conference number: 5th https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6253102 |
Conference
| Conference | IEEE International Conference on Cloud Computing 2012 |
|---|---|
| Abbreviated title | CLOUD 2012 |
| Country/Territory | United States of America |
| City | Honolulu |
| Period | 24/06/12 → 29/06/12 |
| Internet address |
Keywords
- IaaS
- Kernel data structures
- points-to analysis
- semantic gap
- virtualization-aware security solutions
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver