CHEN Xing-shu, ZHAO Cheng, TAO Shu-song. KVM-Based Windows Virtual Machine User Process Protection[J]. Journal of University of Electronic Science and Technology of China, 2016, 45(6): 950-957. DOI: 10.3969/j.issn.1001-0548.2016.06.013
Citation: CHEN Xing-shu, ZHAO Cheng, TAO Shu-song. KVM-Based Windows Virtual Machine User Process Protection[J]. Journal of University of Electronic Science and Technology of China, 2016, 45(6): 950-957. DOI: 10.3969/j.issn.1001-0548.2016.06.013

KVM-Based Windows Virtual Machine User Process Protection

  • To protect the process memory and execution paths of system calls from the threat of malicious code on Windows virtual machine, a KVM-based virtual machine user process protection solution is proposed. Combined with hardware virtualization technologies, a shadow kernel is built for Windows virtual machine to protect the original kernel system call paths from being hooked by malicious code. Meanwhile, the process memory is secured through filtering out-of-process system calls in the monitoring agent, intercepting the switching behaviors of page tables, monitoring the exceptions of breakpoints, and debugging of the virtual machine. In addition, a shadow monitoring agent is built to safeguard the virtual machine's monitor agent memory. A prototype system VMPPS was thus designed and implemented with its validity tests and analysis results showing that process memory and execution paths of system calls of the virtual machine are effectively protected within an acceptable performance loss range.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return