信息网络安全 ›› 2015, Vol. 15 ›› Issue (4): 56-61.doi: 10.3969/j.issn.1671-1122.2015.04.010

• • 上一篇    下一篇

一种基于VMM的内核级Rootkit检测技术

张磊, 陈兴蜀(), 任益, 李辉   

  1. 四川大学计算机学院网络与可信计算研究所,四川成都 610065
  • 收稿日期:2015-02-05 出版日期:2015-04-10 发布日期:2018-07-16
  • 作者简介:

    作者简介: 张磊(1983-),男,四川,博士研究生,主要研究方向:信息安全、虚拟化技术;陈兴蜀(1968-),女,四川,教授,博士,主要研究方向:信息安全、计算机网络、云计算;任益(1990-),男,四川,硕士研究生,主要研究方向:信息安全、虚拟化技术;李辉(1989-),男,重庆,硕士研究生,主要研究方向:信息安全、虚拟化技术。

  • 基金资助:
    国家自然科学基金[61272447];国家科技支撑计划[2012BAH18B05]

Kernel-level Rootkit Detection Technology Based on VMM

Lei ZHANG, Xing-shu CHEN(), Yi REN, Hui LI   

  1. Network and Trusted Computing Institute, School of Computer Science, Sichuan Univ, Chengdu Sichuan 610065, China
  • Received:2015-02-05 Online:2015-04-10 Published:2018-07-16

摘要:

针对云平台中的虚拟机内核级Rootkit破坏租户虚拟机完整性的问题,文章提出一种基于VMM(虚拟机监视器,Virtual Machine Monitor)的内核级Rootkit检测技术。该技术以在关键路径设置陷入点的方式构建TML(True Module List),得到虚拟机中真实的内核模块视图,在VMM层利用自下而上的调用方式获取虚拟机用户态视图,并在VMM层获取重构的虚拟机内核态视图,通过交叉对比这三个视图检测隐藏在虚拟机中的Rootkit。最后,利用该技术在KVM(基于内核的虚拟机,Kernel-based Virtual Machine)中实现了原型系统,实验结果表明系统能迅速准确地检测出虚拟机中的Rootkit,并依据TML报告内核级Rootkit的详细信息,系统的综合性能损耗在可接受范围内。

关键词: VMM, 内核级Rootkit检测, 关键路径陷入点, KVM

Abstract:

Kernel-level Rootkits of virtual machine in cloud can destroy the integrity of virtual machine of tenant. This paper presents a kind of kernel-level Rootkit detection technology based on Virtual Machine Monitor (VMM). This technology establishes True Module List (TML) by critical path breakpoint and obtains the virtual machine’s kernel module view, the user mode view was established by bottom-up calls from VMM, and the reconstructed kernel mode view of virtual machine was get in the VMM layer, then by cross-referencing these three views to detect Rootkit hidden in a virtual machine. Finally, a prototype system was realized based on the Kernel-based Virtual Machine (KVM), experimental results showed that Rootkits in Virtual Machine could be quickly and ac-curately detected in the prototype system, details of Rootkit could be reported according to TML, the overall per-formance loss of the prototype system was in acceptable range.

Key words: VMM, kernel-level Rootkit detection, critical path breakpoint, KVM

中图分类号: