河北大学学报(自然科学版) ›› 2018, Vol. 38 ›› Issue (2): 194-203.DOI: 10.3969/j.issn.1000-1565.2018.02.012

• • 上一篇    下一篇

基于硬件虚拟化的虚拟机内核完整性保护

杨晓晖,许烨   

  • 收稿日期:2017-06-20 出版日期:2018-03-25 发布日期:2018-03-25
  • 作者简介:杨晓晖(1975—),男,河北巨鹿人,河北大学教授,博士,主要从事分布计算与信息安全等方向研究. E-mail:yxh@hbu.edu.cn
  • 基金资助:
    国家重点研发计划专项(2017YFB0802300)

A virtual machine kernel integrity protection method based on hardware virtualization

YANG Xiaohui,XU Ye   

  1. School of Cyber Security and Computer, Hebei University, Baoding 071002, China
  • Received:2017-06-20 Online:2018-03-25 Published:2018-03-25

摘要: 虚拟化技术在为用户带来方便的同时,也为恶意程序提供了更多的攻击机会.针对虚拟机内核完整性面临的安全威胁,提出了一种基于硬件虚拟化的虚拟机内核完整性主动保护方法,通过硬件虚拟化扩展机制从2方面保护内核数据、代码以及关键寄存器:一方面为关键的内核数据与代码创建独立的页表并设置访问权限,使其运行在隔离的地址空间内;一方面利用硬件虚拟化的“陷入”机制使得关键寄存器一旦被篡改便下陷到VMM(virtual machine monitor).实验结果表明本文方法能够检测出常见的内核级Rootkit,并能阻止其对系统的恶意篡改,性能开销控制在7%以内,在提升安全性的同时,不会对性能产生明显的影响.

关键词: 硬件虚拟化, 虚拟机内核, 完整性保护, Intel VT

Abstract: Virtualization technology provides convenience for users,but also provides more attacks.Aiming at the problem of virtual machine kernel integrity,a virtual machine kernel integrity protection method is proposed based on hardware virtualization.It can protect the kernel data,code,and registers by using hardware virtualization extensions.On one hand,a separate page table is created for important kernel data and code,and the access permissions is set for the page table to run in an isolated address space.On the other hand,the use of hardware virtualization “trap” mechanism makes the registers drop to VMM when they are tampered.Based on this,the implementation of the system is given and the system is verified.The experimental results show that this method can detect the common kernel-level rootkits and prevent them to tamper with the system.The final performance cost is controlled within 7%.As a result,this method gives enhanced security and will not have a significant impact on performance.

Key words: hardware-based virtualization, virtual machine kernel, integrity protection, Intel VT

中图分类号: