Welcome to Journal of Beijing Institute of Technology
YAN Guang-lu, LUO Sen-lin, WEI Wei, PAN Li-min. Multiple attacks on virtualization-based security monitoring[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2016, 25(2): 254-263. DOI: 10.15918/j.jbit1004-0579.201625.0214
Citation: YAN Guang-lu, LUO Sen-lin, WEI Wei, PAN Li-min. Multiple attacks on virtualization-based security monitoring[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2016, 25(2): 254-263. DOI: 10.15918/j.jbit1004-0579.201625.0214

Multiple attacks on virtualization-based security monitoring

  • Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed:page mapping problem, lack of overall protection, and inherent limitations. Aiming at these vulnerabilities, relative attack methods were presented in detail. Our experiments show that the attack methods, such as page mapping attack, data attack, and non-behavior detection attack, can attack simulated or original security monitors successfully. Defenders, who need to effectively strengthen their security monitors, can get an inspiration from these attack methods and find some appropriate solutions.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    Baidu
    map