TY - GEN
T1 - Transparency and Semantics Coexist
T2 - International Standard Conference on Trustworthy Computing and Services, ISCTCS 2013
AU - Wang, Guofeng
AU - Liu, Chuanyi
AU - Lin, Jie
PY - 2014
Y1 - 2014
N2 - Modern malware attacks are designed intricately, transport data encrypted, so monitoring network traffic can't solve such attacks completely. Therefore, network monitoring and analysis need to be combined with system behavior monitoring and memory analysis, and the latter is more important. In this article we propose a hardware-based virtualization prototype system, combined with memory analysis tools to monitor and counterwork malicious attacks actively. The system is based on Xen virtualization platform, which monitoring virtual machine behavior by capturing specific events. The events are triggered by some specific behaviors associated with malicious software monitoring, such as executing privileged instruction, system calls, memory writing, etc. When necessary, we can dump the memory of the virtual machine, use memory analysis tools for detailed analysis, so as to achieve the purpose of monitoring and counterworking.
AB - Modern malware attacks are designed intricately, transport data encrypted, so monitoring network traffic can't solve such attacks completely. Therefore, network monitoring and analysis need to be combined with system behavior monitoring and memory analysis, and the latter is more important. In this article we propose a hardware-based virtualization prototype system, combined with memory analysis tools to monitor and counterwork malicious attacks actively. The system is based on Xen virtualization platform, which monitoring virtual machine behavior by capturing specific events. The events are triggered by some specific behaviors associated with malicious software monitoring, such as executing privileged instruction, system calls, memory writing, etc. When necessary, we can dump the memory of the virtual machine, use memory analysis tools for detailed analysis, so as to achieve the purpose of monitoring and counterworking.
KW - Hardware assisted virtualization
KW - Malware attacks detecting
KW - Memory analysis
UR - https://www.scopus.com/pages/publications/84904749917
U2 - 10.1007/978-3-662-43908-1_4
DO - 10.1007/978-3-662-43908-1_4
M3 - 会议稿件
AN - SCOPUS:84904749917
SN - 9783662439074
T3 - Communications in Computer and Information Science
SP - 29
EP - 37
BT - Trustworthy Computing and Services - International Conference, ISCTCS 2013, Revised Selected Papers
PB - Springer Verlag
Y2 - 1 November 2013 through 1 November 2013
ER -