[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SP.2006.38guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

SubVirt: Implementing malware with virtual machines

Published: 21 May 2006 Publication History

Abstract

Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-level, operating system code. In this paper, we assume the perspective of the attacker, who is trying to run malicious software and avoid detection. By assuming this perspective, we hope to help defenders understand and defend against the threat posed by a new class of rootkits. We evaluate a new type of malicious software that gains qualitatively more control over a system. This new type of malware, which we call a virtual-machine based rootkit (VMBR), installs a virtual-machine monitor underneath an existing operating system and hoists the original operating system into a virtual machine. Virtual-machine based rootkits are hard to detect and remove because their state cannot be accessed by software running in the target system. Further, VMBRs support general-purpose malicious services by allowing such services to run in a separate operating system that is protected from the target system. We evaluate this new threat by implementing two proof-of-concept VMBRs. We use our proof-of-concept VMBRs to subvert Windows XP and Linux target systems, and we implement four example malicious services using the VMBR platform. Last, we use what we learn from our proof-of-concept VMBRs to explore ways to defend against this new threat. We discuss possible ways to detect and prevent VMBRs, and we implement a defense strategy suitable for protecting systems against this threat.

Cited By

View all
  • (2024)A Survey of Hardware Improvements to Secure Program ExecutionACM Computing Surveys10.1145/367239256:12(1-37)Online publication date: 12-Jun-2024
  • (2023)Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing TechniquesProceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization10.1145/3579990.3580007(55-67)Online publication date: 17-Feb-2023
  • (2022)Next-Generation Optimization Models and Algorithms in Cloud and Fog Computing Virtualization SecurityScientific Programming10.1155/2022/24192912022Online publication date: 1-Jan-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
May 2006
399 pages
ISBN:0769525741

Publisher

IEEE Computer Society

United States

Publication History

Published: 21 May 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey of Hardware Improvements to Secure Program ExecutionACM Computing Surveys10.1145/367239256:12(1-37)Online publication date: 12-Jun-2024
  • (2023)Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing TechniquesProceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization10.1145/3579990.3580007(55-67)Online publication date: 17-Feb-2023
  • (2022)Next-Generation Optimization Models and Algorithms in Cloud and Fog Computing Virtualization SecurityScientific Programming10.1155/2022/24192912022Online publication date: 1-Jan-2022
  • (2022)PosterProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3563514(3415-3417)Online publication date: 7-Nov-2022
  • (2020)Position Paper: Consider Hardware-enhanced Defenses for Rootkit AttacksProceedings of the 9th International Workshop on Hardware and Architectural Support for Security and Privacy10.1145/3458903.3458909(1-9)Online publication date: 17-Oct-2020
  • (2020)Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devicesProceedings of the 36th Annual Computer Security Applications Conference10.1145/3427228.3427293(428-441)Online publication date: 7-Dec-2020
  • (2019)Supporting security sensitive tenants in a bare-metal cloudProceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference10.5555/3358807.3358856(587-602)Online publication date: 10-Jul-2019
  • (2019)Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoningProceedings of the 9th Workshop on Software Security, Protection, and Reverse Engineering10.1145/3371307.3371313(1-12)Online publication date: 9-Dec-2019
  • (2019)Dynamic Malware Analysis in the Modern Era—A State of the Art SurveyACM Computing Surveys10.1145/332978652:5(1-48)Online publication date: 13-Sep-2019
  • (2019)Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege SeparationACM Transactions on Privacy and Security10.1145/330969822:2(1-30)Online publication date: 26-Feb-2019
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media