Multiple attacks on virtualization-based security monitoring

Guang Lu Yan, Sen Lin Luo, Wei Wei, Li Min Pan*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem, lack of overall protection, and inherent limitations. Aiming at these vulnerabilities, relative attack methods were presented in detail. Our experiments show that the attack methods, such as page mapping attack, data attack, and non-behavior detection attack, can attack simulated or original security monitors successfully. Defenders, who need to effectively strengthen their security monitors, can get an inspiration from these attack methods and find some appropriate solutions.

Original languageEnglish
Pages (from-to)254-263
Number of pages10
JournalJournal of Beijing Institute of Technology (English Edition)
Volume25
Issue number2
DOIs
Publication statusPublished - 1 Jun 2016

Keywords

  • Attack method
  • Security threat
  • Virtual machine monitor
  • Virtualization
  • Vulnerability

Fingerprint

Dive into the research topics of 'Multiple attacks on virtualization-based security monitoring'. Together they form a unique fingerprint.

Cite this