UVHM: model checking based formal analysis scheme for hypervisors

  • Authors:
  • Yuchao She;Hui Li;Hui Zhu

  • Affiliations:
  • State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, P.R. China;State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, P.R. China;State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, P.R. China, Network and Data Security Key Laboratory of Sichuan Province, Xidian University, Chengdu, P.R. Chin ...

  • Venue:
  • ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Hypervisors act a central role in virtualization for cloud computing. However, current security solutions, such as installing IDS model on hypervisors to detect known and unknown attacks, can not be applied well to the virtualized environments. Whats more, people have not raised enough concern about vulnerabilities of hypervisors themselves. Existing works mainly focusing on hypervisors' code analysis can only verify the correctness, rather than security, or only be suitable for open-source hypervisors. In this paper, we design a binary analysis tool using formal methods to discover vulnerabilities of hypervisors. In the scheme, Z notation, VDM, B, Object-Z or CSP formalism can be utilized as suitable modeling and specification languages. Our proposal sequently follows the process of disassembly, modeling, specification, and verification. Finally, the effectiveness of the method is demonstrated by detecting the vulnerability of Xen-3.3.0 in which a bug is added.