Detecting malware signatures in a thin hypervisor

  • Authors:
  • Yoshihiro Oyama;Tran Truong Duc Giang;Yosuke Chubachi;Takahiro Shinagawa;Kazuhiko Kato

  • Affiliations:
  • The University of Electro-Communications, Chofugaoka, Chofu-shi, Tokyo, Japan;The University of Electro-Communications, Chofugaoka, Chofu-shi, Tokyo, Japan;University of Tsukuba, Tennodai, Tsukuba, Ibaraki, Japan;The University of Tokyo, Yayoi, Bunkyo-ku, Tokyo, Japan;University of Tsukuba, Tennodai, Tsukuba, Ibaraki, Japan

  • Venue:
  • Proceedings of the 27th Annual ACM Symposium on Applied Computing
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Enhancement of security using hypervisors is an effective approach that has been extensively studied. This paper is concerned with hypervisors using the parapass-through architecture, in which most of the I/O accesses from the operating system are passed through the hypervisor, while the minimum accesses necessary to implement security functionality are mediated by the hypervisor. Parapass-through hypervisors can provide various security functionalities such as encryption of storage data and creation of virtual private networks. Although a previous study has detailed a method for protecting privacy with a parapass-through hypervisor, it has not yet clarified a method for detecting malware. In this paper, we propose a scheme for incorporating malware detection functionality into a parapass-through hypervisor. Using this scheme, we implemented BVMD, an extension of a parapass-through hypervisor BitVisor, for malware detection. BVMD detects malware by comparing the contents of the data I/O with the malware signatures. A major advantage of BVMD is that its detection depends only slightly on the guest operating system. We confirmed through experiments that BVMD could detect many in-the-wild malware.