CN101499016A - Virtual machine monitor, virtual machine system and process handling method of client operating system - Google Patents

Virtual machine monitor, virtual machine system and process handling method of client operating system Download PDF

Info

Publication number
CN101499016A
CN101499016A CN 200810057354 CN200810057354A CN101499016A CN 101499016 A CN101499016 A CN 101499016A CN 200810057354 CN200810057354 CN 200810057354 CN 200810057354 A CN200810057354 A CN 200810057354A CN 101499016 A CN101499016 A CN 101499016A
Authority
CN
China
Prior art keywords
client
virtual machine
page table
address
machine monitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200810057354
Other languages
Chinese (zh)
Other versions
CN101499016B (en
Inventor
刘春梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN 200810057354 priority Critical patent/CN101499016B/en
Publication of CN101499016A publication Critical patent/CN101499016A/en
Application granted granted Critical
Publication of CN101499016B publication Critical patent/CN101499016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Memory System Of A Hierarchy Structure (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a virtual machine monitor, a virtual machine operating system and a method of handling customers. The virtual machine monitor comprises an obtaining module used for obtaining process segmental information while the operating system is changing by the environment. According to the information referred to in paragraph referred to the process of acquiring customers linear address; the process of identification modules, described the process used to identify; Page Table Identity Module, used to identify the process of identification modules described in the process of identification of the corresponding shadow page table, shadow page table above are described in Records of customer and machine linear physical memory address page Address correspondence; positioning module for customers under the above mentioned linear address and the shadow page table location described in the process of physical machines memory page. The invention has an accurate realization of the machine process the positioning of physical memory pages; at the same time, protecting the process the security of that system.

Description

Virtual machine monitor, dummy machine system and process handling method of client operating system
Technical field
The present invention relates to operating system process treatment technology, particularly a kind of virtual machine monitor, dummy machine system and process handling method of client operating system.
Background technology
Internal memory is one of valuable source of operating system management, also is the main target of virus attack.The protection of internal memory is one of the most basic security service of providing of secure operating system.Memory protect typically refers to the data of protection user in internal memory, and each process is not disturbed mutually in the assurance system, isolated process and process, user-isolated space and kernel spacing, and necessary access control.
But because operating system perfect inadequately to memory protect, or perhaps some convenient mechanism that operating system self provides have destroyed this insulation blocking, make many viruses utilize this leak.Utilized the mode of long-range injection executable code and the method for long-range establishment thread to attack as Rootkit virus, Rootkit virus is the debug authority by the authority that promotes oneself, open a far-end process such as IE then, to far-end process application virtual memory address, write viral code, or the dll file name, create remote thread then and move this viral code.
In realizing process of the present invention, find the technical scheme that also in VMM (Virtual MonitorMachine, virtual machine monitor), the client operating system process is not positioned in the prior art.
Summary of the invention
The purpose of the embodiment of the invention provides a kind of virtual machine monitor, dummy machine system and process handling method of client operating system, is implemented among the VMM location to process in the client operating system under the virtual environment.
In order to realize said method, the embodiment of the invention provides a kind of virtual machine monitor, comprising:
Acquisition module is used for obtaining the segment information of a process when client operating system generation environmental change, and obtains client's linear address of described process according to described segment information;
The process identification module is used to discern described process;
The page table identification module is used to discern the pairing shadow page table of process that described process identification module identifies, and records the corresponding relation of described client's linear address and machine physical memory page address in the described shadow page table;
Locating module is used for locating according to described client's linear address and described shadow page table the machine physical memory page of described process.
Above-mentioned virtual machine monitor, wherein, described acquisition module specifically comprises:
Record cell is used for when described client operating system generation environmental change, the segment information of the described process in the record CPU register;
Computing unit is used for calculating according to the segment information of described process described client's linear address of described process.
Above-mentioned virtual machine monitor wherein, also comprises:
Protection module is used to protect the code segment of process described in the described machine physical memory page.
Above-mentioned virtual machine monitor, wherein, described protection module is specially verification unit, is used for the code segment of the described process of the machine physical memory page of described process is carried out verification.
Above-mentioned virtual machine monitor, wherein, described protection module is specially the unit is set, and the code segment of described process that is used for the machine physical memory page of described process is set to read-only.
In order better to realize above-mentioned purpose, the embodiment of the invention also provides a kind of dummy machine system, comprises client operating system and virtual machine monitor, and wherein, described virtual machine monitor comprises:
Acquisition module is used for obtaining the segment information of a process when client operating system generation environmental change, and obtains client's linear address of described process according to described segment information;
The process identification module is used to discern described process;
The page table identification module is used to discern the pairing shadow page table of process that described process identification module identifies, and records the corresponding relation of described client's linear address and machine physical memory page address in the described shadow page table;
Locating module is used for locating according to described client's linear address and described shadow page table the machine physical memory page of described process.
Above-mentioned dummy machine system, wherein, described acquisition module specifically comprises:
Record cell is used for when described client operating system generation environmental change, the segment information of the described process in the record CPU register;
Computing unit is used for calculating according to the segment information of described process described client's linear address of described process.
Above-mentioned dummy machine system, wherein, described virtual machine monitor also comprises:
Protection module is used to protect the code segment of process described in the described machine physical memory page.
Above-mentioned dummy machine system, wherein, described protection module is specially verification unit, is used for the code segment of the described process of the machine physical memory page of described process is carried out verification.
Above-mentioned dummy machine system, wherein, described protection module is specially the unit is set, and the code segment of described process that is used for the machine physical memory page of described process is set to read-only.
In order better to realize above-mentioned purpose, the embodiment of the invention also provides a kind of process handling method of client operating system, wherein, comprising:
When client operating system generation environmental change, obtain the segment information of a process, and obtain client's linear address of described process according to described segment information;
Discern described process;
Discern the pairing shadow page table of the described process that identifies, record the corresponding relation of described client's linear address and machine physical memory page address in the described shadow page table;
Locate the machine physical memory page of described process according to described client's linear address and described shadow page table.
Above-mentioned method wherein, also comprises:
Code segment to the described process in the machine physical memory page of described process carries out verification; And/or
The code segment of the described process in the machine physical memory page of described process is set to read-only.
Above-mentioned method, wherein, the shadow page table of the described process correspondence of described identification specifically comprises:
Virtual machine monitor obtains the client physical address in the CR3 register of the process title of described client operating system notice and process correspondence;
Described virtual machine monitor obtains the machine physical address of the described shadow page table of described client physical address correspondence;
Described virtual machine monitor obtains described shadow page table according to the machine physical address of described shadow page table;
Corresponding described process and the described shadow page table preserved of described virtual machine monitor.
Above-mentioned method, wherein, the shadow page table of the described process correspondence of described identification specifically comprises:
Virtual machine monitor is set up client physical address in the process CR3 register and the process name corresponding relation between being referred to as;
After described virtual machine monitor obtains the described process title of described client operating system notice, corresponding relation between being referred to as according to the client physical address in the described process CR3 register and described process name obtains the client physical address in the corresponding described CR3 register;
Described virtual machine monitor obtains the machine physical address of the described shadow page table of described client physical address correspondence;
Described virtual machine monitor obtains described shadow page table according to the machine physical address of described shadow page table; Corresponding described process and the described shadow page table preserved of described virtual machine monitor.
Above-mentioned method, wherein, the step that described virtual machine monitor is set up client physical address in the process CR3 register and the process name corresponding relation between being referred to as specifically comprises:
During described client operating system generation environmental change, the described virtual machine monitor record as ready client physical address in the client CR3 register of journey of advancing;
Described virtual machine monitor obtains the title of the described process of current operation;
Described virtual machine monitor carries out advance client physical address in the client CR3 register of journey and the title of described current operation process of the described as ready of last registration of storage corresponding one by one.
The embodiment of the invention has following beneficial effect:
In the embodiment of the invention; the client's linear address by obtaining process and the shadow page table of process; accurately realized location according to the corresponding relation of described client's linear address that writes down in client's linear address and the shadow page table and machine physical memory page address to the machine physical memory page of process; realize simple; simultaneously; according to location, and then process carried out effective protection, to such an extent as to protected the safety of process system to the machine physical memory page of process.
Description of drawings
Fig. 1 is the structural representation of the dummy machine system of the embodiment of the invention;
Fig. 2 is the schematic flow sheet of the method for the embodiment of the invention.
Embodiment
In the embodiment of the invention; preserve among the VMM and the corresponding Shadow page table of process (shadow page table); record the linear address of process in the client operating system and the corresponding relation between the machine physical memory addresses in this Shadow page table; and then after finding corresponding machine physical memory addresses by VMM according to the linear address of current process; locate corresponding machine physical memory page, and process is protected.
Fig. 1 is the structural representation of the dummy machine system of the embodiment of the invention, and as shown in Figure 1, dummy machine system comprises GOS (can be one or more, be that example describes with a GOS only among Fig. 1), VMM and real hardware, wherein is provided with among the VMM:
The page table identification module is used for discerning the Shadow page table of the process correspondence of GOS, records the corresponding relation between process linear address and the machine physical memory addresses in the described Shadow page table;
Client process Physical Page acquisition module is used for obtaining the machine physical memory page of process according to process location information when described client operating system generation environmental change;
This client process Physical Page acquisition module comprises record cell and computing unit, wherein:
Record cell is used for after intercepting and capturing the visit CR3 operation registers (client operating system generation process switching) of carrying out when GOS carries out process switching, the segment information of the process in the record CPU register, and wherein process section information comprises:
Code segment base address in the CS_base register and the code segment size in the CS_1imit register;
Data segment base address in the DS_base register and the data segment size in the DS_1imit register.
When GOS is written into as ready and advances the page directory of journey, need write client's physical memory addresses of this process page directory tables to the CR3 register, in case GOS visit CR3 register will be intercepted and captured by VMM, cause the switching of GOS to VMM running environment.
Computing unit is used for the linear address of the segment information calculation procedure of the process that obtains according to record cell, that is:
Obtain the process linear address of process code segment correspondence according to code segment base address and code segment size;
Obtain the process linear address of process data section correspondence according to data segment base address and data segment size.
The process identification module is used for discerning the process of GOS;
Locating module, be used for linear address according to process, and client process linear address that writes down in the Shadow page table of the process correspondence that identifies and the corresponding relation between the machine physical memory addresses, obtain the machine physical memory page of process, realization is to the location of process in the actual physical internal memory, that is:
Linear address according to the process code segment, and client's linear address that writes down in the Shadow page table of the process correspondence that identifies and the corresponding relation between the machine physical memory addresses, obtain the machine physical memory page of process code segment, realize location the process code segment;
Linear address according to the process data section, and client's linear address that writes down in the Shadow page table of the process correspondence that identifies and the corresponding relation between the machine physical memory addresses, obtain the machine physical memory page of process data section, realize location the process code segment.
Behind the machine physical memory page of the code segment of localization and data segment, can carry out corresponding subsequent processing to process according to this positioning result, as tracking, protection etc., therefore, in the dummy machine system of the embodiment of the invention, also comprise:
Protection module be used for carrying out verification according to the code to the machine physical memory page of process code segment, or the machine physical memory page of process code segment is set to read-only.
Fig. 2 is the schematic flow sheet of the method for the embodiment of the invention, and as shown in Figure 2, the method for the embodiment of the invention comprises:
Step 21, the Shadow page table of the process correspondence among the identification GOS records the corresponding relation between client process linear address and the machine physical memory addresses in the Shadow page table of process;
Step 22, when environmental change takes place in GOS, the current operation process among the identification GOS;
Step 23, the process section information in the register of record CPU, wherein process section information comprises:
Code segment base address in the CS_base register and the code segment size in the CS_limit register;
Data segment base address in the DS_base register and the data segment size in the DS_limit register.
Step 24, the process section information that obtains according to logging modle is obtained client's linear address of current operation process, that is:
Obtain process code segment corresponding client linear address according to code segment base address and code segment size;
Obtain process data section corresponding client linear address according to data segment base address and data segment size.
Step 25, client's linear address according to current operation process, and client's linear address that writes down in the Shadow page table of the current operation process that identifies and the corresponding relation between the machine physical memory addresses, obtain the machine physical memory page of current operation process, that is:
Client's linear address according to the process code segment, and client process linear address that writes down in the Shadow page table of the process correspondence that identifies and the corresponding relation between the machine physical memory addresses, obtain the machine physical memory page of process code segment, realize location the process code segment;
Client's linear address according to the process data section, and client process linear address that writes down in the Shadow page table of the process correspondence that identifies and the corresponding relation between the machine physical memory addresses, obtain the machine physical memory page of process data section, realize location the process code segment.
Step 26 is carried out verification to the process code segment in the machine physical memory page, or the machine physical memory page of process code segment is set to read-only.
Be that example is carried out further detailed description to each step with the process code segment below.
In step 21, need the Shadow page table of the process among the identification GOS, in specific embodiments of the invention, realize by dual mode, as described below respectively.
First kind of mode, step 21 specifically comprises:
Step 21A1, GOS inform the client physical address in the CR3 register of the title of the process that VMM need monitor and process correspondence;
Step 21A2, VMM obtain the machine physical address of Shadow page table of the process of this client physical address correspondence;
Step 21A3, VMM obtains corresponding Shadow page table according to the machine physical address of Shadow page table;
Step 21A4, VMM foundation and preservation need the corresponding relation between the process of the monitoring Shadow page table corresponding with it.
The second way is preserved client physical address in the CR3 register of process correspondence and the process name corresponding relation between being referred to as among the VMM, step 21 specifically comprises:
Step 21B1, VMM set up client physical address in the CR3 register of process correspondence and the process name corresponding relation between being referred to as;
Step 21B2, GOS inform the title of the process that VMM need monitor;
Corresponding relation between step 21B3, GOS are referred to as according to the client physical address in the CR3 register of process correspondence and process name obtains the client physical address of the pairing CR3 register of process that needs monitoring;
Step 21B4, VMM obtain the machine physical address of Shadow page table of the process of this client physical address correspondence;
Step 21B5, VMM obtains corresponding Shadow page table according to the machine physical address of Shadow page table;
Step 21B6, VMM set up and preserve the title of the process that needs monitoring and the corresponding relation between the Shadow page table.
Step 21B1 specifically realizes by following steps:
Step 21B11, when GOS carries out process switching, the VMM record as ready client physical address in the CR3 register of journey correspondence of advancing;
Step 21B12, VMM obtain the title of current operation process, at this, are the readable sign of process;
Step 21B13, the as ready of the wheel record corresponding relation of title of client physical address in the CR3 register of correspondence of journey and current operation process of advancing in the VMM storage.
Because current relatively operation process, in last round of process switching, its identity is the as ready journey of advancing, therefore, in step 21B13, corresponding stored be the advance identification information of journey page directory base address and current operation process of the as ready of going up the wheel record, to guarantee the correct correspondence between the two.
Among step 22 and the step 21B2, all need the readable sign of process of the process of obtaining, its concrete acquisition process is as described below.
Client operating system is process descriptors of all corresponding maintenance of each process, and comprises the readable sign of process in this process descriptors.
With the (SuSE) Linux OS is example, and the process descriptors of current operation process can parse by kernel or interrupt stack pointer information in the Linux management of process, stores because stack information is arranged in the page that links to each other with progress information.
Therefore, can obtain the process descriptors of current operation process by following code.
movl?$0xffffe000,%ecx/*or?0xfffff000?for?4KB?stacks*/
andl?%esp,%ecx
movl(%ecx),p
And for Windows operating system, the process descriptors of current operation process can be resolved from prcb (processor control block) and be obtained, for each processor, the address of prcb is fixed, so VMM can obtain the process descriptors of current operation process easily according to this address.
After the process descriptors of having obtained current operation process, can therefrom obtain the readable sign of process of current operation process.
Certainly, VMM obtains this process descriptors and can also be, by special interface the process descriptors table is exposed to VMM by GOS, tells VMM as the mode by virtual unit.
In the step 23, the register information of record CPU, comprising:
Code segment base address in the CS_base register and the code segment size in the CS_limit register;
Data segment base address in the DS_base register and the data segment size in the DS_limit register; The register information of CPU is as follows, comprising:
eip; /*execution?pointer*/
esp; /*stack?pointer*/
eflags; /*flags?register*/
cr0;
cr3; /*page?table?directory*/
cr4;
idtr_limit;/*idt*/
idtr_base;
gdtr_limit;/*gdt*/
gdtr_base;
cs_sel; /*cs?selector*/
cs_limit;
cs_base;
cs_arbytes;
ds_sel; /*ds?selector*/
ds_limit;
ds_base;
ds_arbytes;
es_sel; /*es?selector*/
es_limit;
es_base;
es_arbytes;
ss_sel; /*ss?selector*/
ss_limit;
ss_base;
ss_arbytes;
fs_sel;/*fs?selector*/
fs_limit;
fs_base;
fs_arbytes;
gs_sel; /*gs?selector*/
gs_limit;
gs_base;
gs_arbytes;
tr_sel; /*task?selector*/
tr_limit;
tr_base;
tr_arbytes;
ldtr_sel; /*ldtr?selector*/
ldtr_limit;
ldtr_base;
ldtr_arbytes;
In step 23, for the client operating system that uses section mechanism, VMM can obtain the base address of code segment/data segment and the size of code segment/data segment from context switches, and, can from executable file, obtain the base address of code segment/data segment and the size of code segment/data segment by the executable file loader for the client operating system of the section employment mechanism that weakened.
In step 26, need carry out verification to the process code segment in the machine physical memory page, at this, can realize in the following manner in the specific embodiments of the invention:
Utilize the process code segment in the machine physical memory page to do the Hash computing, carry out verification;
Utilize the process code segment in the machine physical memory page to do the MD5 computing, carry out verification.
Certainly, also can realize verification by other modes to code segment.
And that the machine physical memory page of process code segment is set to is read-only, can then can't make amendment to the code space of this process in Guest OS by the pairing Shadow page table of process code segment being labeled as read-only the realization.
Because in Intel Virtualization Technology; the page table of really using is the Shadow page table among the VMM, though GOS can revise the page table attribute of process, real page table setting is finished by VMM; therefore can control the real attribute of page table by VMM, to reach the purpose of memory protect.
With Rootkit virus is example; owing to be labeled as read-only in the corresponding Shadow page table; the machine page that shows correspondence cannot be shared; like this when Rootkit virus is used the long-range implantttion technique of operating system; open another process a process; when this process application virtual memory; because the physical memory of the machine among the VMM can not be shared; the page table of code segment correspondence is read-only simultaneously; this process application memory failure then; can't realize protection to far-end process injecting codes to internal memory.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by the mode that software adds necessary general hardware platform, can certainly pass through hardware, but obviously the former is better embodiment.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product comprise some instructions with so that a computer equipment (said here computer equipment is a generalized concept, include but not limited to personal computer, server, the network equipment etc.) the described method of the execution embodiment of the invention.
The above only is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (15)

1. a virtual machine monitor is characterized in that, comprising:
Acquisition module is used for obtaining the segment information of a process when client operating system generation environmental change, and obtains client's linear address of described process according to described segment information;
The process identification module is used to discern described process;
The page table identification module is used to discern the pairing shadow page table of process that described process identification module identifies, and records the corresponding relation of described client's linear address and machine physical memory page address in the described shadow page table;
Locating module is used for locating according to described client's linear address and described shadow page table the machine physical memory page of described process.
2. virtual machine monitor according to claim 1 is characterized in that, described acquisition module specifically comprises:
Record cell is used for when described client operating system generation environmental change, the segment information of the described process in the record CPU register;
Computing unit is used for the described client's linear address according to the described process of described process section information calculations.
3. virtual machine monitor according to claim 1 and 2 is characterized in that, also comprises:
Protection module is used to protect the code segment of process described in the described machine physical memory page.
4. virtual machine monitor according to claim 3 is characterized in that described protection module is specially verification unit, is used for the code segment of the described process of the machine physical memory page of described process is carried out verification.
5. virtual machine monitor according to claim 3 is characterized in that, described protection module is specially the unit is set, and the code segment of described process that is used for the machine physical memory page of described process is set to read-only.
6. a dummy machine system comprises client operating system and virtual machine monitor, it is characterized in that, described virtual machine monitor comprises:
Acquisition module is used for obtaining the segment information of a process when client operating system generation environmental change, and obtains client's linear address of described process according to described segment information;
The process identification module is used to discern described process;
The page table identification module is used to discern the pairing shadow page table of process that described process identification module identifies, and records the corresponding relation of described client's linear address and machine physical memory page address in the described shadow page table;
Locating module is used for locating according to described client's linear address and described shadow page table the machine physical memory page of described process.
7. dummy machine system according to claim 6 is characterized in that, described acquisition module specifically comprises:
Record cell is used for when described client operating system generation environmental change, the segment information of the described process in the record CPU register;
Computing unit is used for calculating according to the segment information of described process described client's linear address of described process.
8. according to claim 6 or 7 described dummy machine systems, it is characterized in that described virtual machine monitor also comprises:
Protection module is used to protect the code segment of process described in the described machine physical memory page.
9. dummy machine system according to claim 8 is characterized in that described protection module is specially verification unit, is used for the code segment of the described process of the machine physical memory page of described process is carried out verification.
10. dummy machine system according to claim 8 is characterized in that, described protection module is specially the unit is set, and the code segment of described process that is used for the machine physical memory page of described process is set to read-only.
11. a process handling method of client operating system is characterized in that, comprising:
When client operating system generation environmental change, obtain the segment information of a process, and obtain client's linear address of described process according to described segment information;
Discern described process;
Discern the pairing shadow page table of the described process that identifies, record the corresponding relation of described client's linear address and machine physical memory page address in the described shadow page table;
Locate the machine physical memory page of described process according to described client's linear address and described shadow page table.
12. method according to claim 11 is characterized in that, also comprises:
Code segment to the described process in the machine physical memory page of described process carries out verification; And/or
The code segment of the described process in the machine physical memory page of described process is set to read-only.
13., it is characterized in that the shadow page table of the described process correspondence of described identification specifically comprises according to claim 11 or 12 described methods:
Virtual machine monitor obtains the client physical address in the CR3 register of the process title of described client operating system notice and process correspondence;
Described virtual machine monitor obtains the machine physical address of the described shadow page table of described client physical address correspondence;
Described virtual machine monitor obtains described shadow page table according to the machine physical address of described shadow page table;
Corresponding described process and the described shadow page table preserved of described virtual machine monitor.
14., it is characterized in that the shadow page table of the described process correspondence of described identification specifically comprises according to claim 11 or 12 described methods:
Virtual machine monitor is set up client physical address in the process CR3 register and the process name corresponding relation between being referred to as;
After described virtual machine monitor obtains the described process title of described client operating system notice, corresponding relation between being referred to as according to the client physical address in the described process CR3 register and described process name obtains the client physical address in the corresponding described CR3 register;
Described virtual machine monitor obtains the machine physical address of the described shadow page table of described client physical address correspondence;
Described virtual machine monitor obtains described shadow page table according to the machine physical address of described shadow page table; Corresponding described process and the described shadow page table preserved of described virtual machine monitor.
15. method according to claim 14 is characterized in that, the step that described virtual machine monitor is set up client physical address in the process CR3 register and the process name corresponding relation between being referred to as specifically comprises:
During described client operating system generation environmental change, the described virtual machine monitor record as ready client physical address in the client CR3 register of journey of advancing;
Described virtual machine monitor obtains the title of the described process of current operation;
Described virtual machine monitor carries out advance client physical address in the client CR3 register of journey and the title of described current operation process of the described as ready of last registration of storage corresponding one by one.
CN 200810057354 2008-01-31 2008-01-31 Virtual machine monitor, virtual machine system and process handling method of client operating system Active CN101499016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200810057354 CN101499016B (en) 2008-01-31 2008-01-31 Virtual machine monitor, virtual machine system and process handling method of client operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200810057354 CN101499016B (en) 2008-01-31 2008-01-31 Virtual machine monitor, virtual machine system and process handling method of client operating system

Publications (2)

Publication Number Publication Date
CN101499016A true CN101499016A (en) 2009-08-05
CN101499016B CN101499016B (en) 2011-09-21

Family

ID=40946100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200810057354 Active CN101499016B (en) 2008-01-31 2008-01-31 Virtual machine monitor, virtual machine system and process handling method of client operating system

Country Status (1)

Country Link
CN (1) CN101499016B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663312A (en) * 2012-03-20 2012-09-12 中国科学院信息工程研究所 ROP attack detection method and system based on virtual machine
CN102708330A (en) * 2012-05-10 2012-10-03 深信服网络科技(深圳)有限公司 Method for preventing system from being invaded, invasion defense system and computer
WO2014131319A1 (en) * 2013-02-27 2014-09-04 华为技术有限公司 Methods and apparatuses for identifying and tracking process of operating system, and for obtaining information
CN105843671A (en) * 2016-03-22 2016-08-10 西安电子科技大学 Cloud platform based virtual machine resource security monitoring and risk preprocessing system
CN108920253A (en) * 2018-06-20 2018-11-30 成都虫洞奇迹科技有限公司 A kind of the virtual machine monitoring system and monitoring method of no agency
CN110955546A (en) * 2018-09-26 2020-04-03 迈普通信技术股份有限公司 Memory address monitoring method and device and electronic equipment
CN111052114A (en) * 2017-06-07 2020-04-21 惠普发展公司,有限责任合伙企业 Intrusion detection system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104899077A (en) * 2015-06-30 2015-09-09 北京奇虎科技有限公司 Process information acquiring method and device based on container technology

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100472547C (en) * 2006-03-21 2009-03-25 联想(北京)有限公司 System and method for killing ROOTKIT
CN100489782C (en) * 2006-06-29 2009-05-20 联想(北京)有限公司 Virtual machine system and accessing control method of hardware equipment
CN100568181C (en) * 2007-06-22 2009-12-09 浙江大学 Dummy machine system and its implementation based on virtualizing technique of processor

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663312A (en) * 2012-03-20 2012-09-12 中国科学院信息工程研究所 ROP attack detection method and system based on virtual machine
CN102663312B (en) * 2012-03-20 2014-10-01 中国科学院信息工程研究所 ROP attack detection method and system based on virtual machine
CN102708330A (en) * 2012-05-10 2012-10-03 深信服网络科技(深圳)有限公司 Method for preventing system from being invaded, invasion defense system and computer
CN102708330B (en) * 2012-05-10 2015-07-08 深信服网络科技(深圳)有限公司 Method for preventing system from being invaded, invasion defense system and computer
WO2014131319A1 (en) * 2013-02-27 2014-09-04 华为技术有限公司 Methods and apparatuses for identifying and tracking process of operating system, and for obtaining information
CN105843671B (en) * 2016-03-22 2018-11-16 西安电子科技大学 Resources of virtual machine security monitoring and risk pretreatment system based on cloud platform
CN105843671A (en) * 2016-03-22 2016-08-10 西安电子科技大学 Cloud platform based virtual machine resource security monitoring and risk preprocessing system
CN111052114A (en) * 2017-06-07 2020-04-21 惠普发展公司,有限责任合伙企业 Intrusion detection system
CN111052114B (en) * 2017-06-07 2024-01-09 惠普发展公司,有限责任合伙企业 Intrusion detection system
CN108920253A (en) * 2018-06-20 2018-11-30 成都虫洞奇迹科技有限公司 A kind of the virtual machine monitoring system and monitoring method of no agency
CN108920253B (en) * 2018-06-20 2022-05-17 成都灵跃云创科技有限公司 Agent-free virtual machine monitoring system and monitoring method
CN110955546A (en) * 2018-09-26 2020-04-03 迈普通信技术股份有限公司 Memory address monitoring method and device and electronic equipment
CN110955546B (en) * 2018-09-26 2023-03-21 迈普通信技术股份有限公司 Memory address monitoring method and device and electronic equipment

Also Published As

Publication number Publication date
CN101499016B (en) 2011-09-21

Similar Documents

Publication Publication Date Title
CN101499016B (en) Virtual machine monitor, virtual machine system and process handling method of client operating system
Barresi et al. {CAIN}: Silently breaking {ASLR} in the cloud
CN109923546B (en) Event filtering for virtual machine security applications
NL1034451C2 (en) Monitoring an execution pattern for a target agent on a system that is made suitable for vt.
CN107025405B (en) Method for improving cloud availability and silicon isolation using security forts
US10140130B2 (en) System and method of obfuscation through binary and memory diversity
Gu et al. Process implanting: A new active introspection framework for virtualization
US8990934B2 (en) Automated protection against computer exploits
US20080077767A1 (en) Method and apparatus for secure page swapping in virtual memory systems
CN103460179A (en) Method and apparatus for transparently instrumenting an application program
US10061918B2 (en) System, apparatus and method for filtering memory access logging in a processor
CN103955649B (en) A kind of method of clean boot terminal unit
Wang et al. Vmdetector: A vmm-based platform to detect hidden process by multi-view comparison
CN106909437B (en) Virtual machine kernel protection method and device
CN103996004A (en) Highly-available system design method based on virtualization
Xie et al. Enabling accurate data recovery for mobile devices against malware attacks
Mishra et al. vproval: Introspection based process validation for detecting malware in KVM-based cloud environment
Zhong et al. A virtualization based monitoring system for mini-intrusive live forensics
Tian et al. Defeating buffer overflow attacks via virtualization
Poore et al. Evolution of digital forensics in virtualization by using virtual machine introspection
Du et al. Dynamic integrity measurement model based on vTPM
Grimm et al. Automatic mitigation of kernel rootkits in cloud environments
Quynh Operating system fingerprinting for virtual machines
Hizver et al. An introspection-based memory scraper attack against virtualized point of sale systems
EP2720170B1 (en) Automated protection against computer exploits

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant