[1]衷 宜,李淑英,董圣杰,等.Xen虚拟化平台下基于系统调用分析的 语义重构方法[J].南京理工大学学报(自然科学版),2015,39(02):236-240.
 Zhong Yi,Li Shuying,Dong Shengjie,et al.Semantic reconstruction based on analysis of system call on Xen[J].Journal of Nanjing University of Science and Technology,2015,39(02):236-240.
点击复制

Xen虚拟化平台下基于系统调用分析的 语义重构方法
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
39卷
期数:
2015年02期
页码:
236-240
栏目:
出版日期:
2015-04-30

文章信息/Info

Title:
Semantic reconstruction based on analysis of system call on Xen
作者:
衷 宜1李淑英2董圣杰1徐 建1张 宏1
1.南京理工大学 计算机科学与工程学院,江苏 南京 210094; 2.商丘工学院 信息与电子工程学院,河南 商丘 476000
Author(s):
Zhong Yi1Li Shuying2Dong Shengjie1Xu Jian1Zhang Hong1
1.School of Computer Science and Engineering,NUST,Nanjing 210094,China; 2.Information and Electronic Department,Shangqiu Institute of Technology,Shangqiu 476000,China
关键词:
虚拟化 语义鸿沟 系统调用
Keywords:
virtualization semantic gap system calls
分类号:
TP302.7
摘要:
在Xen虚拟化平台下主要通过虚拟机自省(VMI)技术来缩小语义鸿沟。为了消除语义鸿沟,得到详细的虚拟机内部操作信息,该文提出并实现了基于系统调用的语义重构方法。该方法通过在虚拟机监控器层对客户虚拟机内部产生的系统调用进行拦截,获取低级语义,进而重构出操作系统级的高级语义,消除了语义鸿沟。实验结果表明,该方法能够有效地解决语义鸿沟问题,且性能开销小于4%。
Abstract:
In view of that the virtual machine introspection(VMI)for solving the semantics gap can not receive the adequate message of guest virtual machines,a method of semantic reconstruction based on system calls on Xen is designed and implemented to eliminate the semantic gap and get the detailed information about the operation of virtual machine.The method intercepts the system calls of the virtual machine monitor layer to gain the low-level semantic of the guest virtual machine,reconstructs the senior semantic,and eliminates the semantic gap.Experimental results prove that the method can eliminate the semantic gap and maintain the performance overhead within 4%.

参考文献/References:

[1] 项国富,金海,邹德清,等.基于虚拟化的安全监控[J].软件学报,2012,23(8):2173-2187.
Xiang Guofu,Jin Hai,Zou Deqing,et al.Virtualization based security monitoring.[J].Journal of Software,2012,23(8):2173-2187.
[2]Payne B D,Carbone M,Sharif M,et al.Lares:An architecture for secure active monitoring using virtualization[A].Proc of the 29th IEEE Symp on Security and Privacy[C].Washington,US:IEEE Computer Society,2008:233-247.
[3]Barham P,Dragovic B,Fraser K,et al.Xen and the art of virtualization[J].ACM SIGOPS Operating Systems Review,2003,37(5):164-177.
[4]Harif M,Lee W,Cui W,et al.Secure in-VM monitoring using hardware virtualization[A].Proc of the 16th ACM Conference on Computer and Communications Security[C].New York,US:ACM Press,2009:477-487.
[5]Brendan Dolan-Gavitt,Tim Leeky,Michael Zhivichy,et al.VirtuoSo:Narrowing the semantic gap in virtual machine introspection[A].2011 IEEE Symposium on Security and Privacy[C].Oakland,US:IEEE,2011:297-312.
[6]Payne B D,De Carbone M D P,Lee W.Secure and flexible monitoring of virtual machines[A].Computer Security Applications Conference[C].Florida,US:IEEE Computer Society,2007:385-397.
[7]Jones S T,Arpaci-Dusseau A C,Arpaci-Dusseau R H.Antfarm:Tracking processes in a virtual machine environment[A].Proc of Annual USENIX Conference[C].Boston,US:General Track,2006:1-14.
[8]Jiang Xuxian,Wang Xinyuan,Xu Dongyan.Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction[A].Proceedings of the 14th ACM Conference on Computer and Communications security[C].Alexandria,US:ACM,2007:128-138.
[9]徐建,荆文娟,严悍,等.一种软件体系结构风险评估方法[J].南京理工大学学报:2010,34(5):680-685.
Xu Jian,Jing Wenjuan,Yan Han,et al.Methodology for software architecture risk assessment[J].Journal of Nanjing University of Science and Technology,2010,34(5):680-685.
[10]黄纬,温志萍,程初.云计算中基于 K-均值聚类的虚拟机调度算法研究[J].南京理工大学学报,2013,37(6):807-812.
Huang Wei,Wen Zhiping,Cheng Chu.Virtual machine scheduling algorithm based on K-means clustering in cloud computing[J].Journal of Nanjing University of Science and Technology,2013,37(6):807-812.

备注/Memo

备注/Memo:
收稿日期:2014-07-29 修回日期:2014-11-11
基金项目:国家自然科学基金(61300053)
作者简介:衷宜(1979-),女,博士生,讲师,主要研究方向:信息安全,E-mail:zhongyi@njust.edu.cn; 通讯作者:徐建(1979-),男,博士,副教授,主要研究方向:信息安全,E-mail:dolphin.xu@njust.edu.cn。
引文格式:衷宜,李淑英,董圣杰,等.Xen虚拟化平台下基于系统调用分析的语义重构方法[J].南京理工大学学报,2015,39(2):236-240.
投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2015-04-30