Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap

A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic gap. However, kernel data is very complex; an Operating System (OS) kernel contains t...

Full description

Saved in:
Bibliographic Details
Published in2012 IEEE Fifth International Conference on Cloud Computing pp. 836 - 843
Main Authors Ibrahim, A. S., Hamlyn-Harris, J., Grundy, J., Almorsy, M.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2012
Subjects
Online AccessGet full text

Cover

Loading…
Abstract A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic gap. However, kernel data is very complex; an Operating System (OS) kernel contains thousands of data structures that have direct and indirect (pointer) relations between each other with no explicit integrity constraints. This complexity makes it impractical to use manual methods. In this paper, we present a new solution to systematically and efficiently solve the semantic gap for any OS, without any prior knowledge of the OS. We present: (i) KDD, a tool that systematically builds a precise kernel data definition for any C-based OS such as Windows and Linux. KDD generates this definition by performing points-to analysis on the kernel's source code to disambiguate the pointer relations. (ii) SVA, a security appliance that solves the semantic gap based on the generated definition, to systematically and externally map the virtual machines' physical memory and extract the runtime dynamic objects. We have implemented prototypes for KDD and SVA, and have performed different experiments to prove their effectiveness.
AbstractList A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic gap. However, kernel data is very complex; an Operating System (OS) kernel contains thousands of data structures that have direct and indirect (pointer) relations between each other with no explicit integrity constraints. This complexity makes it impractical to use manual methods. In this paper, we present a new solution to systematically and efficiently solve the semantic gap for any OS, without any prior knowledge of the OS. We present: (i) KDD, a tool that systematically builds a precise kernel data definition for any C-based OS such as Windows and Linux. KDD generates this definition by performing points-to analysis on the kernel's source code to disambiguate the pointer relations. (ii) SVA, a security appliance that solves the semantic gap based on the generated definition, to systematically and externally map the virtual machines' physical memory and extract the runtime dynamic objects. We have implemented prototypes for KDD and SVA, and have performed different experiments to prove their effectiveness.
Author Grundy, J.
Almorsy, M.
Hamlyn-Harris, J.
Ibrahim, A. S.
Author_xml – sequence: 1
  givenname: A. S.
  surname: Ibrahim
  fullname: Ibrahim, A. S.
  email: aibrahim@swin.edu.au
  organization: Centre for Comput. & Eng. Software Syst., Swinburne Univ. of Technol., Melbourne, VIC, Australia
– sequence: 2
  givenname: J.
  surname: Hamlyn-Harris
  fullname: Hamlyn-Harris, J.
  email: jhamlynharris@swin.edu.au
  organization: Centre for Comput. & Eng. Software Syst., Swinburne Univ. of Technol., Melbourne, VIC, Australia
– sequence: 3
  givenname: J.
  surname: Grundy
  fullname: Grundy, J.
  email: jgrundy@swin.edu.au
  organization: Centre for Comput. & Eng. Software Syst., Swinburne Univ. of Technol., Melbourne, VIC, Australia
– sequence: 4
  givenname: M.
  surname: Almorsy
  fullname: Almorsy, M.
  email: malmorsy@swin.edu.au
  organization: Centre for Comput. & Eng. Software Syst., Swinburne Univ. of Technol., Melbourne, VIC, Australia
BookMark eNo9jM9LwzAcxaNOcJu7evGSf6Azv75pcxxTpzDYoZvXkbaJi65NSVNl_vVaFOHBg_c-703QqPGNQeiGkjmlRN0t15vd_ZwRyuaUqTM0IalUIFIAdY7GjIJKJFXkAs1UmlEhU84yxcjov8vYFZp13RshhJIMgPIxes_7tvUhuuYVv7gQe310Xzo63ySLTx0Mzk3ZBxdPOPfHfsg7vOsGWuP81EVT_8AlXrRt8Lo84Ojx5sOE0tcGx8Mwr3UzECvdXqNLq4-dmf35FG0fH7bLp2S9WT0vF-vEKRKTzBbVj3QFwpZVYQrLgRNqBRQAYLgqpK5KKygFqbgkFRO00KasUsmYTQWfotvfW2eM2bfB1Tqc9pIBh0zyb_sPYKM
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CLOUD.2012.129
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 0769547559
9780769547558
EISSN 2159-6190
EndPage 843
ExternalDocumentID 6253586
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
ABLEC
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-8fbdfbdad54fcdbebf35301f45b555e39b6adcf411569360d241baecd7622f743
IEDL.DBID RIE
ISBN 9781467328920
1467328928
ISSN 2159-6182
IngestDate Wed Jun 26 19:24:14 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-8fbdfbdad54fcdbebf35301f45b555e39b6adcf411569360d241baecd7622f743
PageCount 8
ParticipantIDs ieee_primary_6253586
PublicationCentury 2000
PublicationDate 2012-June
PublicationDateYYYYMMDD 2012-06-01
PublicationDate_xml – month: 06
  year: 2012
  text: 2012-June
PublicationDecade 2010
PublicationTitle 2012 IEEE Fifth International Conference on Cloud Computing
PublicationTitleAbbrev cloud
PublicationYear 2012
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001085513
ssj0000781062
Score 1.5497335
Snippet A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of...
SourceID ieee
SourceType Publisher
StartPage 836
SubjectTerms Algorithm design and analysis
Context
Data structures
IaaS
Kernel
Kernel data structures
points-to analysis
Runtime
Security
semantic gap
Semantics
virtualization-aware security solutions
Title Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap
URI https://ieeexplore.ieee.org/document/6253586
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp6mbuJvcvBoujZtanIc0zlEnbBNdhtNk8gYbmN0CP71vqRZFfEglNKWFtrkJe_L6_e-h9BVnAsd5jQmIexJQnVCeCoYoTlVlFmXLx1B9jkdTJKHKZvW0HWVC6O1duQzHdhD9y9frfKtDZV1AKvHjKd1VL8RoszVquIpVrQm9NJ3Lr5iCViuOjI4NQErJE5dXldq1WkE5Tu5J38eekHHKBSd3uNwcmtZXzSILPT8UXbFeZ1-Ez3t3rckmyyCbSGD_POXlON_P2gftb_z-_BL5bkOUE0vD1FzV-AB-_HeQgtb83NldQbe8Ot8Y1NNfNom6X5kG41HvvodrqJr2HEQcIZHlUQ07nrdclys8BCGDhi5xgA84fF36Fi44z5bt9G4fzfuDYivzkDmIiwIN1LBlimWmFxJLU3MYLIwCZOMMR0LmWYqNwkgzlTEaagAKshM5wpmX2oAtxyhxnK11McIUwWGEoFJC5MlXGphIgmrIm04gB_OoxPUsk03W5f6GzPfaqd_Xz5De7brSjrXOWoUm62-AOBQyEtnMV_f4b2g
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4QD3pCBeNve_DoYOvWpT0SFFH5YQIYbmRdW0OIQMiIiX-9r12ZxngwWZZt2ZKtfe37-va97yF0E6Zc-SkJPR_2XkRU5LGYU4-kRBJqXL6wBNl-3BlHTxM6KaHbIhdGKWXJZ6puDu2_fLlMNyZU1gCsHlIW76BdwNUszrO1ioiKka3xnfidjbAYCpatjwxujcMaiRGb2RUbfRpO2FbwyZ37TtIx8Hmj1R2M7wzvi9QDAz5_FF6xfqddQb3tG-d0k3l9k4l6-vlLzPG_n3SAat8Zfvil8F2HqKQWR6iyLfGA3Yivormp-rk0SgNv-HW2NskmLnHTa34ka4WHrv4dLuJr2LIQcIKHhUg0bjrlcpwt8QAGD5i5wgA94fF36Fq44yFZ1dCofT9qdTxXn8GbcT_zmBYStkTSSKdSKKFDCtOFjqiglKqQiziRqY4Ac8Y8jH0JYEEkKpUw_xINyOUYlRfLhTpBmEgwlQCMmuskYkJxHQhYFynNAP4wFpyiqmm66SpX4Ji6Vjv7-_I12uuMet1p97H_fI72TTfm5K4LVM7WG3UJMCITV9Z6vgD49sDr
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+IEEE+Fifth+International+Conference+on+Cloud+Computing&rft.atitle=Supporting+Virtualization-Aware+Security+Solutions+Using+a+Systematic+Approach+to+Overcome+the+Semantic+Gap&rft.au=Ibrahim%2C+A.+S.&rft.au=Hamlyn-Harris%2C+J.&rft.au=Grundy%2C+J.&rft.au=Almorsy%2C+M.&rft.date=2012-06-01&rft.pub=IEEE&rft.isbn=9781467328920&rft.issn=2159-6182&rft.eissn=2159-6190&rft.spage=836&rft.epage=843&rft_id=info:doi/10.1109%2FCLOUD.2012.129&rft.externalDocID=6253586
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2159-6182&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2159-6182&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2159-6182&client=summon