Using virtual machines to do cross-layer damage assessment

  • Authors:
  • Xiaoqi Jia;Shengzhi Zhang;Jiwu Jing;Peng Liu

  • Affiliations:
  • Pennsylvania State University, University Park, PA, and Graduate University of Chinese Academy of Sciences, Beijing, China;Pennsylvania State University, University Park, PA, USA;Graduate University of Chinese Academy of Sciences, Beijing, China;Pennsylvania State University, University Park, PA, USA

  • Venue:
  • Proceedings of the 1st ACM workshop on Virtual machine security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present an approach that uses virtual machines to do ``out-of-the-box'' cross-layer damage assessment, an indispensable part of security/risk management. To resolve the conflict between fine-grained damage assessment and the response time requirements of service requests, we present a new production environment damage assessment architecture. We have implemented a major portion of the architecture and done preliminary evaluation. Contributions of our system include combining instruction and OS level taint tracking, and efficient ``what-if'' damage assessment methods.