CN103279414B - A kind of convert channel detection method being applicable to Xen virtual platform - Google Patents

A kind of convert channel detection method being applicable to Xen virtual platform Download PDF

Info

Publication number
CN103279414B
CN103279414B CN201310195439.XA CN201310195439A CN103279414B CN 103279414 B CN103279414 B CN 103279414B CN 201310195439 A CN201310195439 A CN 201310195439A CN 103279414 B CN103279414 B CN 103279414B
Authority
CN
China
Prior art keywords
variable
description symbol
symbol table
function
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310195439.XA
Other languages
Chinese (zh)
Other versions
CN103279414A (en
Inventor
沈晴霓
张壮壮
吴中海
卿斯汉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Original Assignee
Peking University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University filed Critical Peking University
Priority to CN201310195439.XA priority Critical patent/CN103279414B/en
Publication of CN103279414A publication Critical patent/CN103279414A/en
Application granted granted Critical
Publication of CN103279414B publication Critical patent/CN103279414B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of convert channel detection method being applicable to Xen virtual platform, this method is: the atom operation 1) searching Xen virtual platform, and the entrance function determining every unary operation; 2) a variable description symbol table is constructed to each entrance function, and provide output parameter list; 3) the variable description symbol table obtained is got common factor between two, if there is a variable in occuring simultaneously, this variable reads attribute R in a variable description symbol table, attribute W is write in another variable description symbol table, and this variable and this have an entrance function corresponding to variable description symbol table reading attribute R spread out of parameters equivalent, then judge that this variable is as potential convert channel; 4) scenario building is carried out to the potential convert channel detected, verify whether this potential convert channel is true convert channel.The present invention significantly reduces workload, accurately can locate position and the call relation of the shared resource of potential convert channel.

Description

A kind of convert channel detection method being applicable to Xen virtual platform
Technical field
The invention belongs to the security fields of virtual platform, relate generally to a kind of detection method of Xen virtual platform being carried out to convert channel.
Background technology
Xen virtual platform comes from the virtual machine project of increasing income that univ cambridge uk's computer laboratory starts in April, 2002, is now widely deployed in large server, carries out security study have important theory and realistic meaning to it.
The concept of convert channel is put forward in 1973 by Lampson the earliest, and China standard GB/T 17859-1999 specifies that convert channel is that operation process is to endanger the communication channel of the mode transmission information of system strategy.Secure operating system is in the material time crossed over from the third level to the fourth stage now, and Covert Channel Analysis is exactly key one ring wherein.
Propose time of 40 years so far from convert channel problem, the research object of convert channel includes from operating system, database, network cloud environment until now.But with regard to the depth of investigation, research methods all now and engineering practice are carried out for operating system aspect mostly.Along with the rise of cloud computing, the cloud security problem comprising convert channel is also outstanding day by day.
Cloud computing be continue mainframe computer to client-server big change after another great change, be regarded as the third wave of infotech.Intel Virtualization Technology is the core component of cloud computing system, is the gordian technique with efficiency utilization is fully integrated in various calculating and storage resources, is the foundation stone of cloud computing infrastructure dirigibility.Therefore profound significance is had to the security study of Intel Virtualization Technology to cloud security, and Xen virtual platform is as one of current most widely used virtualization software, the convert channel problem studied on it not only has very large impetus to the perfect of convert channel theory and expansion, also has the convert channel problem in cloud security, cloud environment and well inspires meaning.
Below the Patent relevant to Covert channel mark that is virtual platform that be that can find at present.
Publication number is 101364203, denomination of invention a kind of patent belonging to Covert Channel Analysis technical field that has been the disclosure of the invention of " a kind of systematic analysis towards Covert Channel Analysis and division methods ".Described method comprises: towards systematic analysis and the division methods of Covert Channel Analysis, step 10: initialization action; Step 11: whether discriminant function calling graph is empty, if be idle running step 12, represent that analyzing partitioning algorithm terminates, otherwise goes to step 13; Step 12: export the result analyzed; Step 13: whether discriminant function calling graph is communicated with; Step 14: find out all disconnected branches of function call graph; Step 15: each connected component of cycle analysis function call graph; Step 16: whether there is the node not relying on other nodes in discriminant function calling graph; Step 18: the node being 0 out-degree is deleted from function call graph, and this node is added the end of result chained list; Step 19: whether there is very big strong continune subgraph in discriminant function calling graph; Go to step 1A as existed, otherwise go to step 11; Step 1A: find very big strong continune subgraph in function call graph; Step 1B: delete this very big strong continune subgraph, step 1C: terminate.
Although this patent is also under the jurisdiction of Covert Channel Analysis technical field, its focus paid close attention to mainly is placed on the function calling relationship analyzing whole system, and system is divided into connected component and analyzes.
Publication number is 101257417, and denomination of invention has been the disclosure of the invention of " the ICP/IP protocol convert channel detection method based on fuzzy neural network " based on the ICP/IP protocol convert channel detection method of fuzzy neural network.The method adopts the method for fuzzy neural network to analyze by the territory in the TCP/IP data packet head structure of network interface, introduce a kind of new method of Sampling network convert channel, first the method obtains the TCP/IP packet flowed out from network interface, analysis is carried out to the option field in data head-coating structure and obtains network connection features vector, proper vector is sent into fuzzy neural network, adaptive neuro-fuzzy inference system is utilized to train fuzzy neural network, obtain the model of fuzzy neural network, then proper vector is sent in the model of the complete fuzzy neural network of training, obtain output valve, finally fuzzy clustering is carried out to output valve, thus tell in the data of output whether there is convert channel.This invention is applicable to mainstream operation system, has range of application widely, can increase the security of operating system, effectively prevent confidential information from revealing.
Although this patent also relates to the realization of convert channel detection method.But it to as if for the analysis of the Network Covert Channel such as ICP/IP protocol, adopt the method for fuzzy neural network to realize.
Summary of the invention
For the Covert Channel Analysis problem of Xen virtual platform, current not Patents relates to this field.But along with the rise of cloud computing, the cloud security problem comprising convert channel is also outstanding day by day.Intel Virtualization Technology, as the core component of cloud computing system, is analyzed the convert channel of Xen virtual platform and is just had more theory and realistic meaning.The present invention is directed to this demand, a kind of convert channel detection method being applicable to Xen virtual platform is provided, the present invention takes the entrance function of the key operation of Analysis of X en virtual platform related mechanism and strategy, analysis is carried out to its external variable and provides its variable description symbol, and then obtain the variable description symbol table of function.The variable description symbol table of different function is compared, potential convert channel can be identified.
Below some terms related in invention are first set forth:
One, atom operation a: atom operation refers in Xen system, for realizing the basic operation of certain function of Xen fundamental mechanism and strategy, usual Xen system is that its each fundamental mechanism/strategy both defines one group of atom operation fixed.
With Xen fundamental mechanism and all atom operation of policy-related (noun), can analyze from the description of Xen systemic-function specification or its codes implement and draw.From code level analysis, each atom operation is operation corresponding to each case branch of switch statement in its alignment processing function.
Two, marking variable: suppose variable a be function f access external variable (external variable refers to the variable of action scope outside function body in function f.The method finding the external variable of a function sees whether the variable that function is quoted has it to define in function body, if nothing, be then the external variable of function), then the kernel data structure corresponding to variable a is identified out the marking variable just defining variable a.The written form of marking variable be " data structure. variable ", if kernel data structure exists nested, then according to " outermost layer data structure. .... innermost layer data structure. variable " mode write.
Three, variable description symbol: the variable description symbol in function uses < marking variable, function name, and function is to the operation of variable, and the condition needed for read operation, the condition > needed for retouching operation represents.(variable here refers in particular to the Partial Variable of action scope outside function body)
Wherein, the operation of function to variable have reading, amendment and both have concurrently three kinds (wherein in function, the new variable created is considered as readable amendment), represent with R, W and RW respectively; Reading or the condition needed for retouching operation refer to that function reads to this variable or revise the condition that must meet, and if there is no namely restrictive condition replaces with NULL.
Four, variable description symbol table: the variable description symbol table set of the descriptor of external variables all for function composition just being formed this function.Wherein, the variable description symbol table of the every other function of this function call is also included.
If analyze external variables all in function, corresponding variable description symbol set can be obtained.Owing to removing under function recursive call sum functions calls the prerequisite of ring, concerning a function, its function calling relationship is finite.Therefore the variable description symbol table of other functions of this function call is included in the set obtained.
Five, variable is of equal value: according to another name rule, if be the another name of variable b to variable a; Or the numerical value change of variable a and variable b exist corresponding relation, this Two Variables can be considered as being of equal value.
Based on Xen virtual platform convert channel detection method as shown in Figure 1, concrete steps are:
1) find out all atom operation according to the fundamental mechanism of Xen with strategy, and determine its entrance function;
2) to each entrance function constructed variable descriptor table, and output parameter list (can analyze from the data transition functions such as function return value or similar copy_to_user () and draw) is provided; Wherein the method for constructed variable descriptor table is: analyze the external variable in entrance function and all call functions thereof, obtain the descriptor < marking variable of external variable, function name, function is to the operation of variable, condition needed for read operation, the condition > needed for retouching operation.These variable descriptions symbol is formed the variable description symbol table that namely set forms this entrance function.
3) by the variable description symbol table obtained with marking variable attribute for standard gets friendship (Two Variables descriptor table can be same) between two.Under conjunction of occuring simultaneously is not empty prerequisite, if occur simultaneously, the read-write properties that there is the variable of a certain variable in original Two Variables descriptor table in closing have R and W respectively, and this variable and authority have the words spreading out of parameters equivalent of the entrance function corresponding to variable description symbol table of R, this variable just can form potential convert channel, as shown in Figure 2.Parameters equivalent mentioned here refers to, the Two Variables that another name rule or variable interact relation can be utilized to obtain can be considered as being of equal value.
4) whether carry out scenario building to the potential convert channel identified, be true convert channel to verify.General scenario building is that atom operation carries out write operation to this variable by being W to this variable read-write attribute, and then read-write properties are that the atom operation of R reads, and then analyzes and draw received secret information.
Compared with prior art, good effect of the present invention is:
One, owing to starting with for the entrance function of the fundamental mechanism of Xen and the key operation of strategy, solve the problem of the analytical work exponential increase caused because of factors such as system source code are huge, complex structure, significantly reduce workload.
Two, because method is carried out on the labor basis of the external variable to function, position and the call relation of the shared resource of potential convert channel can accurately be located.
Accompanying drawing explanation
Fig. 1 is holistic approach process flow diagram of the present invention;
Fig. 2 be variable description symbol table with marking variable attribute for standard gets friendship method flow diagram between two.
Embodiment
The present invention is the entrance function of the key operation taking Analysis of X en virtual platform related mechanism and strategy, carries out analysis and provides its variable description symbol, and then obtain the variable description symbol table of function to its external variable.The variable description symbol table of different function is compared, potential convert channel can be identified.Specifically be implemented as follows: (being operating as example with query event channel status)
1) find out all atom operation according to the Mode and policy of Xen, and determine its entrance function;
The ultimate principle that Xen virtual platform control and management is correlated with comprises with core technology and controlling and the hypercalls communicating relevant (Hypercalls) and event channel (EventChannels) to virtual machine level of privilege, share and transmit relevant authorization list (GrantTables) to virtual-machine data, the equipment I relevant to virtual device models/O ring and XenStore etc.
In the event channel mechanism of Xen system, corresponding all atom operation comprise establishment event channel operation EVTCHNOP_alloc_unbound, bindings EVTCHNOP_bind_interdomain between territory, binding virtual interrupt operation EVTCHNOP_bind_virq, binding physical interrupt operation EVTCHNOP_bind_pirq, binding virtual IP address I operates EVTCHNOP_bind_ipi, close event channel operation EVTCHNOP_close, send event notification operations EVTCHNOP_send, query event channel status operation EVTCHNOP_status, binding VCPU operates EVTCHNOP_bind_vcpu, remove mask bit manipulation EVTCHNOP_unmask, resetting event channel operation EVTCHNOP_reset etc.
Wherein, the entrance function of the atom operation of query event channel status is function evtchn_status (); Between the territory of event channel, the entrance function of bindings is function evtchn_bind_interdomain ().
2) to each entrance function constructed variable descriptor table, and output parameter list is provided;
In the atom operation of query event channel status, variable chn-> state is the external variable of its entrance function evtchn_status (), core texture body corresponding to it is structevtchn, then its marking variable is structevtchn.state.Then the variable description symbol of variable chn-> state in function evtchn_status () is:
<structevtchn.state,evtchn_status,R,NULL,NULL>;
Analysis obtains the variable description symbol table of this function after obtaining the variable description symbol of all external variables in function evtchn_status ():
{<structevtchn.state,evtchn_status,R,NULL,NULL>};
In like manner, between the territory obtaining event channel, the variable states descriptor table of bindings entrance function evtchn_bind_interdomain () is:
<structtask_struct.domain.domain_id,evtchn_bind_interdomain,R,structevtchn_bind_interdomain.remote_dom=DOMID_SELF,NULL>,
<structevtchn.state,evtchn_bind_interdomain,RW,NULL,NULL>,
<structevtchn.u.unbound.remote_domid,evtchn_bind_interdomain,R,NULL,NULL>,
<structevtchn.u.unbound.remote_port,evtchn_bind_interdomain,W,NULL,NULL>}。
3) by the variable description symbol table obtained with marking variable attribute for standard gets common factor (Two Variables descriptor table can be same) between two.
The variable description symbol table of EVTCHNOP_status and EVTCHNOP_bind_interdomain atom operation is got common factor between two, common factor is combined into
<structevtchn.state,evtchn_status,R,NULL,NULL>,
<structevtchn.state,evtchn_bind_interdomainRW,NULL,NULL>}
And chn-> state and EVTCHNOP_status feature operation entrance function evtchn_status spread out of parameters equivalent, so structevtchn.state variable just forms a potential convert channel.
4) whether carry out scenario building to the potential convert channel identified, be true convert channel to verify.The method of current scenario building is: transmit leg virtual machine process realizes the write operation to structevtchn.state variable by EVTCHNOP_bind_interdomain feature operation, take over party's virtual machine process realizes the read operation to structevtchn.state variable by EVTCHNOP_status feature operation, determines by the change of perception structevtchn.state variable the data that transmit leg transmits.
Aforesaid operations is repeated to other atom operation.

Claims (6)

1. be applicable to a convert channel detection method for Xen virtual platform, the steps include:
1) search the atom operation of Xen virtual platform, and determine the entrance function of every unary operation; Wherein, described atom operation is the basic operation of certain function realizing fundamental mechanism and strategy in Xen virtual platform;
2) a variable description symbol table is constructed to each entrance function, and provide output parameter list; Wherein, the method constructing described variable description symbol table is: obtain the external variable in entrance function and all call functions of this entrance function, a variable description symbol is built to each external variable obtained, these variable descriptions symbol is formed the variable description symbol table that namely set forms this entrance function; The method for expressing of described variable description symbol is: < marking variable, function name, function to the operation of variable, the condition needed for read operation, the condition > needed for retouching operation;
3) the variable description symbol table obtained is got common factor between two, if there is a variable in occuring simultaneously, this variable reads attribute R in a variable description symbol table, attribute W is write in another variable description symbol table, and this variable and this have the output parameter of the entrance function corresponding to variable description symbol table reading attribute R of equal value, then judge that this variable is as potential convert channel;
Wherein, judge the method for parameters equivalent for: utilize another name this variable of rule judgment to have the output parameter relation of equivalence of the entrance function corresponding to the variable description symbol table reading attribute R with this, if variable a is the another name of variable b, then variable a and variable b equivalence; Or utilize variable interact relation judge this variable and this have the output parameter relation of equivalence of the entrance function corresponding to variable description symbol table reading attribute R, if the numerical value change of variable a and variable b exist corresponding relation, then variable a and variable b is considered as equivalence;
4) scenario building is carried out to the potential convert channel detected, verify whether this potential convert channel is true convert channel.
2. the method for claim 1, is characterized in that the method for expressing of described marking variable is: establish variable a to be the external variable that function f is accessed, the kernel data structure corresponding to variable a is H, then the marking variable form of variable a is H.a.
3. method as claimed in claim 2, is characterized in that, if the kernel data structure of variable exists nested, then according to " outermost layer data structure. .... innermost layer data structure. variable " mode represent.
4. the method for claim 1, is characterized in that the attribute of described external variable in variable description symbol table comprises: write attribute W, read attribute R, or have reading and writing attribute RW simultaneously.
5. the method for claim 1, is characterized in that from Xen virtual platform, drawing described atom operation with strategy according to the fundamental mechanism of Xen virtual platform.
6. method as claimed in claim 5, is characterized in that the fundamental mechanism of described Xen virtual platform comprises with strategy: control with the relevant hypercalls that communicates to virtual machine level of privilege, control with the relevant event channel that communicates with virtual machine level of privilege, share and transmit the authorization list and the equipment I/O ring relevant with virtual device models and XenStore of being correlated with virtual-machine data.
CN201310195439.XA 2013-05-23 2013-05-23 A kind of convert channel detection method being applicable to Xen virtual platform Expired - Fee Related CN103279414B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310195439.XA CN103279414B (en) 2013-05-23 2013-05-23 A kind of convert channel detection method being applicable to Xen virtual platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310195439.XA CN103279414B (en) 2013-05-23 2013-05-23 A kind of convert channel detection method being applicable to Xen virtual platform

Publications (2)

Publication Number Publication Date
CN103279414A CN103279414A (en) 2013-09-04
CN103279414B true CN103279414B (en) 2016-04-20

Family

ID=49061943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310195439.XA Expired - Fee Related CN103279414B (en) 2013-05-23 2013-05-23 A kind of convert channel detection method being applicable to Xen virtual platform

Country Status (1)

Country Link
CN (1) CN103279414B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763399A (en) * 2014-02-18 2014-04-30 苏州云拓网络科技有限公司 Cloud server operation supporting system based on XEN virtualization framework
CN105678176A (en) * 2016-01-15 2016-06-15 瑞达信息安全产业股份有限公司 Mandatory access control method under virtual environment
CN106355250B (en) * 2016-08-31 2019-04-30 天津南大通用数据技术股份有限公司 The optimization method and device of judgement private communication channel neural network based
CN106502650A (en) * 2016-09-28 2017-03-15 乐视控股(北京)有限公司 A kind of read only attribute amending method, device
EP3367606B1 (en) * 2017-02-24 2019-09-18 Secure-IC SAS Automatic insertion of masking into an algorithm
CN109858510A (en) * 2018-11-28 2019-06-07 南京知常容信息技术有限公司 A kind of detection method for http protocol ETag value covert communications

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257417A (en) * 2008-03-25 2008-09-03 浙江大学 Method for detecting TCP/IP protocol concealed channel based on fuzzy neural network
CN102402466A (en) * 2011-08-10 2012-04-04 华为技术有限公司 Method and system for resolving multilateral conflicts of virtualization platform

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8145362B2 (en) * 2006-08-04 2012-03-27 Eestor, Inc. Utility grid power averaging and conditioning

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257417A (en) * 2008-03-25 2008-09-03 浙江大学 Method for detecting TCP/IP protocol concealed channel based on fuzzy neural network
CN102402466A (en) * 2011-08-10 2012-04-04 华为技术有限公司 Method and system for resolving multilateral conflicts of virtualization platform

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
虚拟可信平台层次化安全体系结构设计;沈晴霓 等;《北京工业大学学报》;20100531;第36卷(第5期);第605-610页 *
高等级安全操作系统的设计;卿斯汉 等;《中国科学E辑:信息科学》;20071231;第37卷(第2期);第238-253页 *

Also Published As

Publication number Publication date
CN103279414A (en) 2013-09-04

Similar Documents

Publication Publication Date Title
CN103279414B (en) A kind of convert channel detection method being applicable to Xen virtual platform
CN106104514B (en) Accelerate method, system and the medium of the object in access object repository
TW201902176A (en) Method and apparatus for writing transaction data into a blockchain system
CN102349056B (en) Dynamically composing data stream processing applications
CN109947998A (en) The calculating data lineage of network across heterogeneous system
CN105488431A (en) Authority management method and device for block chain system
CN106055450B (en) A kind of binary log analysis method and device
CN108932588A (en) A kind of the GROUP OF HYDROPOWER STATIONS Optimal Scheduling and method of front and back end separation
CN104145257A (en) Semantic cache cloud services for connected devices
CN105049420A (en) Security protocol formal verification method using expanded UML model as framework
CN103618652A (en) Audit and depth analysis system and audit and depth analysis method of business data
CN107526645A (en) A kind of communication optimization method and system
CN109906597A (en) To with data set that restricted data set and untethered system are stored and fetched from cloud network
CN104200045A (en) Parallel computing method for distributed hydrodynamic model of large-scale watershed system
CN104794150A (en) Cloud storage model and management method based on space knowledge cloud environment
CN104537012B (en) Data processing method and device
CN102508971B (en) Method for establishing product function model in concept design stage
CN109753819B (en) Method and device for processing access control policy
CN104299170B (en) Intermittent energy source mass data processing method
CN113918149A (en) Interface development method and device, computer equipment and storage medium
CN107257356B (en) Social user data optimal placement method based on hypergraph segmentation
Cheptsov HPC in big data age: An evaluation report for java-based data-intensive applications implemented with Hadoop and OpenMPI
CN116015939A (en) Advanced persistent threat interpretation method based on atomic technology template
CN107145599A (en) A kind of big data asset management system
CN104715087A (en) Novel interactive simulation state traveling operating method synthetic system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160420