DocumentCode
3208370
Title
Croth: Effective Process Protection and Monitoring with Hardware Virtualization
Author
Jiang, Menglong ; Qi, Zhengwei ; Guan, Haibing ; Karna, Anil Kumar
Author_Institution
Sch. of Software & Dept. of Comput. Sci., Shanghai Jiao Tong Univ., Shanghai, China
fYear
2009
fDate
17-19 Dec. 2009
Firstpage
633
Lastpage
638
Abstract
With the development of network malicious code, the existing security holes in present systems facilitate data loss. Though protection methods and software are updated day by day, some recent rootkits, that can still invisibly access kernel, make new challenges for the system security. The focal point on system security is how to protect a chosen process on the infected operating system. Process protection and monitoring are becoming more and more important for emerging networks and systems. In this paper, we present a new technique, Croth, which is based on hardware virtualization technology. It introduces a novel mechanism, Cape, that is located in virtual machine monitor (VMM). The main work of Cape is to emulate most of the operations originally done by operating system. This primitive offers an additional dimension of protection beyond the hierarchical protection domains, implemented by traditional operating systems and processor architectures. The design and implementation of hiding sensitive data is also presented in this paper. Our design has been fully implemented and used to protect a wide range of legacy process without any modification on Windows operating system. Our experimental result shows that the operating system could not get accurate data while the chosen process is controlled by Croth. It has provided a little performance overhead, however, performance is still acceptable.
Keywords
data encapsulation; operating systems (computers); security of data; Cape; Croth; Windows operating system; hardware virtualization; network malicious code; process protection; protection methods; security holes; sensitive data hiding; system security; virtual machine monitor; Computer science; Control systems; Data security; Hardware; Kernel; Monitoring; Operating systems; Platform virtualization; Power system protection; Virtual machine monitors; Cape; Croth; Virtual Machine Monitor; Windows operating system; hardware virtualization;
fLanguage
English
Publisher
ieee
Conference_Titel
Frontier of Computer Science and Technology, 2009. FCST '09. Fourth International Conference on
Conference_Location
Shanghai
Print_ISBN
978-0-7695-3932-4
Electronic_ISBN
978-1-4244-5467-9
Type
conf
DOI
10.1109/FCST.2009.26
Filename
5392850
Link To Document