Title :
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Author :
Oliveira, Daniel ; Crandall, Jedidiah R. ; Wassermann, Gary ; Ye, Shaozhi ; Wu, S. Felix ; Su, Zhendong ; Chong, Frederic T.
Author_Institution :
California Univ., Davis, CA
Abstract :
System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operation after an attack, it may not behave properly. Traditional mechanisms for detecting attacks disrupt service and current recovery approaches are application-based and cannot guarantee recovery in the face of exploits that corrupt the kernel, involve multiple processes or target multithreaded network services. This paper presents Bezoar, an automated full-system virtual machine-based approach to recover from zero-day control-flow hijacking attacks. Bezoar tracks down the source of network bytes in the system and after an attack, replays the checkpointed run while ignoring inputs from the malicious source. We evaluated our proof-of-concept prototype on six notorious exploits for Linux and Windows. In all cases, it recovered the full system state and resumed execution. Bezoar incurs low overhead to the virtual machine: less than 1% for the recovery and log components and approximately 1.4X for the memory monitor component that tracks down network bytes, for five SPEC INT 2000 benchmarks.
Keywords :
Internet; Linux; checkpointing; invasive software; virtual machines; Bezoar; Internet worms; Linux; Windows; automated virtual machine; checkpointing; full-system recovery; system availability; Automatic control; Condition monitoring; Face detection; Internet; Kernel; Linux; Prototypes; Target tracking; Virtual machine monitors; Virtual machining;
Conference_Titel :
Network Operations and Management Symposium, 2008. NOMS 2008. IEEE
Conference_Location :
Salvador, Bahia
Print_ISBN :
978-1-4244-2065-0
Electronic_ISBN :
1542-1201
DOI :
10.1109/NOMS.2008.4575125