DocumentCode :
1807141
Title :
SubVirt: implementing malware with virtual machines
Author :
King, S.T. ; Chen, Peter M.
Author_Institution :
Michigan Univ.
fYear :
2006
fDate :
21-24 May 2006
Lastpage :
327
Abstract :
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-level, operating system code. In this paper, we assume the perspective of the attacker, who is trying to run malicious software and avoid detection. By assuming this perspective, we hope to help defenders understand and defend against the threat posed by a new class of rootkits. We evaluate a new type of malicious software that gains qualitatively more control over a system. This new type of malware, which we call a virtual-machine based rootkit (VMBR), installs a virtual-machine monitor underneath an existing operating system and hoists the original operating system into a virtual machine. Virtual-machine based rootkits are hard to detect and remove because their state cannot be accessed by software running in the target system. Further, VMBRs support general-purpose malicious services by allowing such services to run in a separate operating system that is protected from the target system. We evaluate this new threat by implementing two proof-of-concept VMBRs. We use our proof-of-concept VMBRs to subvert Windows XP and Linux target systems, and we implement four example malicious services using the VMBR platform. Last, we use what we learn from our proof-of-concept VMBRs to explore ways to defend against this new threat. We discuss possible ways to detect and prevent VMBRs, and we implement a defense strategy suitable for protecting systems against this threat
Keywords :
Linux; computer viruses; virtual machines; Linux; SubVirt; Windows XP; low-level code; malicious software; malware; operating system code; virtual machines; virtual-machine based rootkit; Control systems; Data structures; Detectors; Intrusion detection; Jacobian matrices; Kernel; Operating systems; Protection; Security; Virtual machining;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 2006 IEEE Symposium on
Conference_Location :
Berkeley/Oakland, CA
ISSN :
1081-6011
Print_ISBN :
0-7695-2574-1
Type :
conf
DOI :
10.1109/SP.2006.38
Filename :
1624022
Link To Document :
بازگشت