Virtualization-based monitoring of untrusted extensions execution

Xingshu Chen,Dandan Zhao,Hui Li,Lei Zhang
DOI: https://doi.org/10.13245/j.hust.160307
2016-01-01
Abstract:To trace the behavior of LKM (loadable kernel modules)rootkits,a hardware assisted vir-tualization based framework for kernel modules running in isolation was proposed to isolate drivers in an address space separate from the kernel by two sets of hardware assisted page tables and to protect integrity of the kernel stack basing on the chain composed of base pointers of stack frames.Eventually a prototype system on the full-virtualization platform of KVM was implemented which was called Hy-per-ISO (Hyper-ISOlation).The experimental result shows that the Hyper-ISO is able to monitor the control transfer processes between the untrusted module and the kernel timely,monitor the untrusted module accessing kernel code or data,and protect the kernel stack from the untrusted module.
What problem does this paper attempt to address?