Rasmusson, Lars and Rajabi Nasab, Mazdak (2012) Hypervisor Integrity Measurement Assistant. [SICS Report]
An attacker who has gained access to a computer may want to upload or modify configuration files, etc., and run arbitrary programs of his choice. We can severely restrict the power of the attacker by having a white-list of approved file checksums and preventing the kernel from loading loading any file with a bad checksum. The check may be placed in the kernel, but that requires a kernel that is prepared for it. The check may also be placed in a hypervisor which intercepts and prevents the kernel from loading a bad file. We describe the implementation of and give performance results for two systems. In one the checksumming, or integrity measurement, and decision is performed by the hypervisor instead of the OS. In the other only the final integrity decision is done in the hypervisor. By moving the integrity check out from the VM kernel it becomes harder for the intruder to bypass the check. We conclude that it is technically possible to put file integrity control into the hypervisor, both for kernels without and with pre-compiled support for integrity measurement.
|Item Type:||SICS Report|
|Deposited By:||Vicki Carleson|
|Deposited On:||05 Sep 2012 15:36|
|Last Modified:||28 Jan 2013 13:55|
Repository Staff Only: item control page