ReVirt: enabling intrusion analysis through virtual-machine logging and replay

  • Authors:
  • George W. Dunlap;Samuel T. King;Sukru Cinar;Murtaza A. Basrai;Peter M. Chen

  • Affiliations:
  • University of Michigan;University of Michigan;University of Michigan;University of Michigan;University of Michigan

  • Venue:
  • OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
  • Year:
  • 2002

Quantified Score

Hi-index 0.02

Visualization

Abstract

Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze attacks that include any non-deterministic events. ReVirt removes the dependency on the target operating system by moving it into a virtual machine and logging below the virtual machine. This allows ReVirt to replay the system's execution before, during, and after an intruder compromises the system, even if the intruder replaces the target operating system. ReVirt logs enough information to replay a long-term execution of the virtual machine instruction-by-instruction. This enables it to provide arbitrarily detailed observations about what transpired on the system, even in the presence of non-deterministic attacks and executions. ReVirt adds reasonable time and space overhead. Overheads due to virtualization are imperceptible for interactive use and CPU-bound workloads, and 13--58% for kernel-intensive workloads. Logging adds 0--8% overhead, and logging traffic for our workloads can be stored on a single disk for several months.