CN106529342B - 基于安全芯片的虚拟机监控器动态完整性检测方法 - Google Patents
基于安全芯片的虚拟机监控器动态完整性检测方法 Download PDFInfo
- Publication number
- CN106529342B CN106529342B CN201610951643.3A CN201610951643A CN106529342B CN 106529342 B CN106529342 B CN 106529342B CN 201610951643 A CN201610951643 A CN 201610951643A CN 106529342 B CN106529342 B CN 106529342B
- Authority
- CN
- China
- Prior art keywords
- security
- virtual machine
- monitor
- machine monitor
- hardware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 42
- 238000012544 monitoring process Methods 0.000 claims abstract description 59
- 238000000034 method Methods 0.000 claims abstract description 46
- 230000008569 process Effects 0.000 claims description 25
- 238000005192 partition Methods 0.000 claims description 19
- 238000004891 communication Methods 0.000 claims description 11
- 238000012545 processing Methods 0.000 claims description 3
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 abstract description 4
- 238000007726 management method Methods 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 230000007547 defect Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000008447 perception Effects 0.000 description 3
- 230000002787 reinforcement Effects 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000005070 sampling Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 108010028984 3-isopropylmalate dehydratase Proteins 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000010223 real-time analysis Methods 0.000 description 1
- 230000003014 reinforcing effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/567—Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Virology (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610951643.3A CN106529342B (zh) | 2016-11-02 | 2016-11-02 | 基于安全芯片的虚拟机监控器动态完整性检测方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610951643.3A CN106529342B (zh) | 2016-11-02 | 2016-11-02 | 基于安全芯片的虚拟机监控器动态完整性检测方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106529342A CN106529342A (zh) | 2017-03-22 |
CN106529342B true CN106529342B (zh) | 2020-06-19 |
Family
ID=58326869
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610951643.3A Active CN106529342B (zh) | 2016-11-02 | 2016-11-02 | 基于安全芯片的虚拟机监控器动态完整性检测方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106529342B (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109151051B (zh) * | 2018-09-12 | 2020-12-08 | 南昌航空大学 | 一种云计算环境下数据安全增强方法 |
CN110008001B (zh) * | 2019-03-29 | 2021-01-05 | 网御安全技术(深圳)有限公司 | 虚拟机监控器的安全加固方法、系统及硬件安全监控卡 |
CN111831609B (zh) * | 2020-06-18 | 2024-01-02 | 中国科学院数据与通信保护研究教育中心 | 虚拟化环境中二进制度量值统一管理和分发的方法和系统 |
CN112256392B (zh) * | 2020-10-22 | 2022-09-20 | 海光信息技术股份有限公司 | 一种度量方法、装置及相关设备 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930213A (zh) * | 2012-10-25 | 2013-02-13 | 中国航天科工集团第二研究院七〇六所 | 基于虚拟机的安全监控系统和安全监控方法 |
CN103139221B (zh) * | 2013-03-07 | 2016-07-06 | 中国科学院软件研究所 | 一种可信虚拟平台及其构建方法、平台之间数据迁移方法 |
CN103500304B (zh) * | 2013-10-13 | 2016-06-29 | 西安电子科技大学 | 基于Xen的虚拟机个性化安全监控系统及监控方法 |
-
2016
- 2016-11-02 CN CN201610951643.3A patent/CN106529342B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
CN106529342A (zh) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10887328B1 (en) | System and method for detecting interpreter-based exploit attacks | |
RU2571723C2 (ru) | Система и способ для снижения нагрузки на операционную систему при работе антивирусного приложения | |
US9781144B1 (en) | Determining duplicate objects for malware analysis using environmental/context information | |
RU2522019C1 (ru) | Система и способ обнаружения угроз в коде, исполняемом виртуальной машиной | |
RU2531861C1 (ru) | Система и способ оценки вредоносности кода, исполняемого в адресном пространстве доверенного процесса | |
RU2454705C1 (ru) | Система и способ защиты компьютерного устройства от вредоносных объектов, использующих сложные схемы заражения | |
Kil et al. | Remote attestation to dynamic system properties: Towards providing complete system integrity evidence | |
EP2994848B1 (en) | Optimized resource allocation for virtual machines within a malware content detection system | |
US10055585B2 (en) | Hardware and software execution profiling | |
US10462160B2 (en) | Method and system for identifying uncorrelated suspicious events during an attack | |
CN106529342B (zh) | 基于安全芯片的虚拟机监控器动态完整性检测方法 | |
KR101043299B1 (ko) | 악성 코드 탐지 방법, 시스템 및 컴퓨터 판독 가능한 저장매체 | |
RU2665911C2 (ru) | Система и способ анализа файла на вредоносность в виртуальной машине | |
US20180183814A1 (en) | Detecting execution of modified executable code | |
CN112685745B (zh) | 一种固件检测方法、装置、设备及存储介质 | |
RU2724790C1 (ru) | Система и способ формирования журнала при исполнении файла с уязвимостями в виртуальной машине | |
Soliman et al. | Taxonomy of malware analysis in the IoT | |
RU2708355C1 (ru) | Способ обнаружения вредоносных файлов, противодействующих анализу в изолированной среде | |
CN106529284B (zh) | 基于安全芯片的虚拟机监控器安全加固方法 | |
CN106445641B (zh) | 一种离散计算节点上安全虚拟平台间的数据迁移方法 | |
US20170171224A1 (en) | Method and System for Determining Initial Execution of an Attack | |
Kadiyala et al. | LAMBDA: Lightweight assessment of malware for emBeddeD architectures | |
Zhang et al. | Iacdroid: Preventing inter-app communication capability leaks in android | |
KR101880689B1 (ko) | 악성코드 진단장치 및 방법 | |
Shen et al. | Toward efficient dynamic analysis and testing for Android malware |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 518000 room 205, 2nd floor, new generation maker Park, Xinwei Road, Jiangwei community, Matian street, Guangming District, Shenzhen City, Guangdong Province Patentee after: Shenzhen Shuan Zhongyi Technology Co.,Ltd. Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.) Patentee before: SHENZHEN QIANHAI SHENGSHENG TECHNOLOGY Co.,Ltd. |
|
CP03 | Change of name, title or address | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231009 Address after: Building 205, Building 1, Shenzhen Software Industry Base, No. 81, 83, and 85, Gaoxin South 10th Road, Binhai Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong Province, 518000 Patentee after: ZHONGYUN XIN'AN (SHENZHEN) TECHNOLOGY CO.,LTD. Address before: 518000 room 205, 2nd floor, new generation maker Park, Xinwei Road, Jiangwei community, Matian street, Guangming District, Shenzhen City, Guangdong Province Patentee before: Shenzhen Shuan Zhongyi Technology Co.,Ltd. |
|
TR01 | Transfer of patent right |