EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments
The use of virtualized environments continues to grow for efficient utilization of the available compute resources. Hypervisors virtualize the underlying hardware resources and allow multiple Operating Systems to run simultaneously on the same infrastructure. Since the hypervisor is installed at a h...
Main Author: | |
---|---|
Format: | Others |
Published: |
PDXScholar
2018
|
Subjects: | |
Online Access: | https://pdxscholar.library.pdx.edu/open_access_etds/4485 https://pdxscholar.library.pdx.edu/cgi/viewcontent.cgi?article=5556&context=open_access_etds |
id |
ndltd-pdx.edu-oai-pdxscholar.library.pdx.edu-open_access_etds-5556 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-pdx.edu-oai-pdxscholar.library.pdx.edu-open_access_etds-55562019-10-20T05:01:18Z EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments Vibhute, Tejaswini Ajay The use of virtualized environments continues to grow for efficient utilization of the available compute resources. Hypervisors virtualize the underlying hardware resources and allow multiple Operating Systems to run simultaneously on the same infrastructure. Since the hypervisor is installed at a higher privilege level than the Operating Systems in the software stack it is vulnerable to rootkits that can modify the environment to gain control, crash the system and even steal sensitive information. Thus, runtime integrity measurement of the hypervisor is essential. The currently proposed solutions achieve the goal by relying either partially or entirely on the features of the hypervisor itself, causing them to lack stealth and leaving themselves vulnerable to attack. We have developed a performance sensitive methodology for identifying rootkits in hypervisors from System Management Mode (SMM) while using the features of SMI Transfer Monitor (STM). STM is a recent technology from Intel and it is a virtual machine manager at the firmware level. Our solution extends a research prototype called EPA-RIMM, developed by Delgado and Karavanic at Portland State University. Our solution extends the state of the art in that it stealthily performs measurements of hypervisor memory and critical data structures using firmware features, keeps performance perturbation to acceptable levels and leverages the security features provided by the STM. We describe our approach and include experimental results using a prototype we have developed for Xen hypervisor on Minnowboard Turbot, an open hardware platform. 2018-07-12T07:00:00Z text application/pdf https://pdxscholar.library.pdx.edu/open_access_etds/4485 https://pdxscholar.library.pdx.edu/cgi/viewcontent.cgi?article=5556&context=open_access_etds Dissertations and Theses PDXScholar Virtual computer systems -- Security measures Rootkits (Computer software) Computer Sciences |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Virtual computer systems -- Security measures Rootkits (Computer software) Computer Sciences |
spellingShingle |
Virtual computer systems -- Security measures Rootkits (Computer software) Computer Sciences Vibhute, Tejaswini Ajay EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments |
description |
The use of virtualized environments continues to grow for efficient utilization of the available compute resources. Hypervisors virtualize the underlying hardware resources and allow multiple Operating Systems to run simultaneously on the same infrastructure. Since the hypervisor is installed at a higher privilege level than the Operating Systems in the software stack it is vulnerable to rootkits that can modify the environment to gain control, crash the system and even steal sensitive information. Thus, runtime integrity measurement of the hypervisor is essential. The currently proposed solutions achieve the goal by relying either partially or entirely on the features of the hypervisor itself, causing them to lack stealth and leaving themselves vulnerable to attack.
We have developed a performance sensitive methodology for identifying rootkits in hypervisors from System Management Mode (SMM) while using the features of SMI Transfer Monitor (STM). STM is a recent technology from Intel and it is a virtual machine manager at the firmware level. Our solution extends a research prototype called EPA-RIMM, developed by Delgado and Karavanic at Portland State University. Our solution extends the state of the art in that it stealthily performs measurements of hypervisor memory and critical data structures using firmware features, keeps performance perturbation to acceptable levels and leverages the security features provided by the STM. We describe our approach and include experimental results using a prototype we have developed for Xen hypervisor on Minnowboard Turbot, an open hardware platform. |
author |
Vibhute, Tejaswini Ajay |
author_facet |
Vibhute, Tejaswini Ajay |
author_sort |
Vibhute, Tejaswini Ajay |
title |
EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments |
title_short |
EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments |
title_full |
EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments |
title_fullStr |
EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments |
title_full_unstemmed |
EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments |
title_sort |
epa-rimm-v: efficient rootkit detection for virtualized environments |
publisher |
PDXScholar |
publishDate |
2018 |
url |
https://pdxscholar.library.pdx.edu/open_access_etds/4485 https://pdxscholar.library.pdx.edu/cgi/viewcontent.cgi?article=5556&context=open_access_etds |
work_keys_str_mv |
AT vibhutetejaswiniajay eparimmvefficientrootkitdetectionforvirtualizedenvironments |
_version_ |
1719272219932098560 |