CN106529284A - 基于安全芯片的虚拟机监控器安全加固方法 - Google Patents
基于安全芯片的虚拟机监控器安全加固方法 Download PDFInfo
- Publication number
- CN106529284A CN106529284A CN201610949602.0A CN201610949602A CN106529284A CN 106529284 A CN106529284 A CN 106529284A CN 201610949602 A CN201610949602 A CN 201610949602A CN 106529284 A CN106529284 A CN 106529284A
- Authority
- CN
- China
- Prior art keywords
- virtual machine
- monitor
- safety
- security
- monitoring system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 230000002787 reinforcement Effects 0.000 title abstract 3
- 238000012544 monitoring process Methods 0.000 claims abstract description 67
- 238000001514 detection method Methods 0.000 claims abstract description 25
- 230000008569 process Effects 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 10
- 238000000638 solvent extraction Methods 0.000 claims description 6
- 230000009545 invasion Effects 0.000 claims description 5
- 206010001488 Aggression Diseases 0.000 claims description 4
- 230000016571 aggressive behavior Effects 0.000 claims description 4
- 208000012761 aggressive behavior Diseases 0.000 claims description 4
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 claims description 4
- 230000009286 beneficial effect Effects 0.000 claims description 3
- 230000006378 damage Effects 0.000 claims description 2
- 238000005192 partition Methods 0.000 claims description 2
- 238000010223 real-time analysis Methods 0.000 claims 1
- 238000004458 analytical method Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 238000007689 inspection Methods 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 4
- 230000007547 defect Effects 0.000 description 3
- 238000005259 measurement Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 230000001681 protective effect Effects 0.000 description 2
- 108010028984 3-isopropylmalate dehydratase Proteins 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000008034 disappearance Effects 0.000 description 1
- 239000000686 essence Substances 0.000 description 1
- 210000004247 hand Anatomy 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000005191 phase separation Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/567—Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Bioethics (AREA)
- Debugging And Monitoring (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610949602.0A CN106529284B (zh) | 2016-11-02 | 2016-11-02 | 基于安全芯片的虚拟机监控器安全加固方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610949602.0A CN106529284B (zh) | 2016-11-02 | 2016-11-02 | 基于安全芯片的虚拟机监控器安全加固方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106529284A true CN106529284A (zh) | 2017-03-22 |
CN106529284B CN106529284B (zh) | 2020-04-28 |
Family
ID=58325174
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610949602.0A Active CN106529284B (zh) | 2016-11-02 | 2016-11-02 | 基于安全芯片的虚拟机监控器安全加固方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106529284B (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107463810A (zh) * | 2017-08-15 | 2017-12-12 | 合肥爱吾宠科技有限公司 | 基于网络通讯实现计算机软件保护的方法 |
CN110008001A (zh) * | 2019-03-29 | 2019-07-12 | 网御安全技术(深圳)有限公司 | 虚拟机监控器的安全加固方法、系统及硬件安全监控卡 |
CN112433822A (zh) * | 2020-12-07 | 2021-03-02 | 北京远为软件有限公司 | 基于三权分立的跨域网络终端虚拟机的实现方法 |
CN115033302A (zh) * | 2022-05-27 | 2022-09-09 | 天翼云科技有限公司 | 一种安全加固方法、装置、设备及介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930213A (zh) * | 2012-10-25 | 2013-02-13 | 中国航天科工集团第二研究院七〇六所 | 基于虚拟机的安全监控系统和安全监控方法 |
CN103139221A (zh) * | 2013-03-07 | 2013-06-05 | 中国科学院软件研究所 | 一种可信虚拟平台及其构建方法、平台之间数据迁移方法 |
CN104200162A (zh) * | 2014-03-17 | 2014-12-10 | 中华电信股份有限公司 | 信息安全监控与防御的计算机程序产品及其方法 |
-
2016
- 2016-11-02 CN CN201610949602.0A patent/CN106529284B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930213A (zh) * | 2012-10-25 | 2013-02-13 | 中国航天科工集团第二研究院七〇六所 | 基于虚拟机的安全监控系统和安全监控方法 |
CN103139221A (zh) * | 2013-03-07 | 2013-06-05 | 中国科学院软件研究所 | 一种可信虚拟平台及其构建方法、平台之间数据迁移方法 |
CN104200162A (zh) * | 2014-03-17 | 2014-12-10 | 中华电信股份有限公司 | 信息安全监控与防御的计算机程序产品及其方法 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107463810A (zh) * | 2017-08-15 | 2017-12-12 | 合肥爱吾宠科技有限公司 | 基于网络通讯实现计算机软件保护的方法 |
CN110008001A (zh) * | 2019-03-29 | 2019-07-12 | 网御安全技术(深圳)有限公司 | 虚拟机监控器的安全加固方法、系统及硬件安全监控卡 |
CN112433822A (zh) * | 2020-12-07 | 2021-03-02 | 北京远为软件有限公司 | 基于三权分立的跨域网络终端虚拟机的实现方法 |
CN115033302A (zh) * | 2022-05-27 | 2022-09-09 | 天翼云科技有限公司 | 一种安全加固方法、装置、设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN106529284B (zh) | 2020-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9998483B2 (en) | Service assurance and security of computing systems using fingerprinting | |
KR101535502B1 (ko) | 보안 내재형 가상 네트워크 제어 시스템 및 방법 | |
US10412109B2 (en) | Method for detecting vulnerabilities in a virtual production server of a virtual or cloud computer system | |
EP2649548B1 (en) | Antimalware protection of virtual machines | |
US8127412B2 (en) | Network context triggers for activating virtualized computer applications | |
US9817970B2 (en) | Method for detecting attacks on virtual machines | |
RU2665911C2 (ru) | Система и способ анализа файла на вредоносность в виртуальной машине | |
CN104023034A (zh) | 一种基于软件定义网络的安全防御系统及防御方法 | |
CN103518359B (zh) | 实现云计算网络防攻击的方法、设备和网络 | |
CN106529284A (zh) | 基于安全芯片的虚拟机监控器安全加固方法 | |
Srivastava et al. | Automatic discovery of parasitic malware | |
US11126468B2 (en) | Agent driven cluster gating for service management | |
CN109379347A (zh) | 一种安全防护方法及设备 | |
RU2708355C1 (ru) | Способ обнаружения вредоносных файлов, противодействующих анализу в изолированной среде | |
JP2023550974A (ja) | イメージ基盤悪性コード検知方法および装置とこれを利用する人工知能基盤エンドポイント脅威検知および対応システム | |
Majhi et al. | A study on security vulnerability on cloud platforms | |
CN106529342B (zh) | 基于安全芯片的虚拟机监控器动态完整性检测方法 | |
CN106445641B (zh) | 一种离散计算节点上安全虚拟平台间的数据迁移方法 | |
CN111859383B (zh) | 软件自动分割方法、系统、存储介质、计算机设备、终端 | |
Han et al. | Empirical study on anti-virus architecture for container platforms | |
CN107516039A (zh) | 虚拟化系统的安全防护方法及装置 | |
Kompalli | Using existing hardware services for malware detection | |
CN109472147A (zh) | 一种虚拟化平台的安全检测方法及装置 | |
US20180260563A1 (en) | Computer system for executing analysis program, and method of monitoring execution of analysis program | |
EP4072094A1 (en) | Method for proving trusted state and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 518000 room 205, 2nd floor, new generation maker Park, Xinwei Road, Jiangwei community, Matian street, Guangming District, Shenzhen City, Guangdong Province Patentee after: Shenzhen Shuan Zhongyi Technology Co.,Ltd. Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.) Patentee before: SHENZHEN QIANHAI SHENGSHENG TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231009 Address after: Building 205, Building 1, Shenzhen Software Industry Base, No. 81, 83, and 85, Gaoxin South 10th Road, Binhai Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong Province, 518000 Patentee after: ZHONGYUN XIN'AN (SHENZHEN) TECHNOLOGY CO.,LTD. Address before: 518000 room 205, 2nd floor, new generation maker Park, Xinwei Road, Jiangwei community, Matian street, Guangming District, Shenzhen City, Guangdong Province Patentee before: Shenzhen Shuan Zhongyi Technology Co.,Ltd. |