Enforcing kernel constraints by hardware-assisted virtualization

  • Authors:
  • Éric Lacombe;Vincent Nicomette;Yves Deswarte

  • Affiliations:
  • CNRS, LAAS, Toulouse, France 31077 and UPS, INSA, INP, ISAE, LAAS, University of Toulouse, Toulouse, France 31077;CNRS, LAAS, Toulouse, France 31077 and UPS, INSA, INP, ISAE, LAAS, University of Toulouse, Toulouse, France 31077;CNRS, LAAS, Toulouse, France 31077 and UPS, INSA, INP, ISAE, LAAS, University of Toulouse, Toulouse, France 31077

  • Venue:
  • Journal in Computer Virology
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This article deals with kernel security protection. We propose a characterization of malicious kernel-targeted actions, based on how the way they act to corrupt the kernel. Then, we discuss security measures able to counter such attacks. We finally expose our approach based on hardware-virtualization that is partially implemented into our demonstrator Hytux, which is inspired from bluepill (Rutkowska in subverting vista kernel for fun and profit. In: Black Hat in Las Vegas, 2006), a malware that installs itself as a lightweight hypervisor--on a hardware-virtualization compliant CPU--and puts a running Microsoft Windows Operating System into a virtual machine. However, in contrast with bluepill, Hytux is a lightweight hypervisor that implements protection mechanisms in a more privileged mode than the Linux kernel.