Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/49955
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor孫雅麗(Yea-Li Sun)
dc.contributor.authorYih-Der Leeen
dc.contributor.author李奕德zh_TW
dc.date.accessioned2021-06-15T12:26:45Z-
dc.date.available2019-08-31
dc.date.copyright2016-08-31
dc.date.issued2016
dc.date.submitted2016-08-09
dc.identifier.citation[1] P. Padala, X. Zhu, Z. Wang, S. Singhal, and K. G. Shin, 'Performance evaluation of virtualization technologies for server consolidation,' HP Labs Tec. Report, 2007.
[2] R. P. Goldberg, 'Survey of virtual machine research,' Computer, vol. 7, pp. 34-45, 1974.
[3] X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario, 'Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware,' in 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), 2008, pp. 177-186.
[4] D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, et al., 'BitBlaze: A new approach to computer security via binary analysis,' in International Conference on Information Systems Security, 2008, pp. 1-25.
[5] L. Martignoni, E. Stinson, M. Fredrikson, S. Jha, and J. C. Mitchell, 'A layered architecture for detecting malicious behaviors,' in International Workshop on Recent Advances in Intrusion Detection, 2008, pp. 78-97.
[6] H. Xiong, Z. Liu, W. Xu, and S. Jiao, 'Libvmi: a library for bridging the semantic gap between guest OS and VMM,' in Computer and Information Technology (CIT), 2012 IEEE 12th International Conference on, 2012, pp. 549-556.
[7] M. I. Sharif, W. Lee, W. Cui, and A. Lanzi, 'Secure in-vm monitoring using hardware virtualization,' in Proceedings of the 16th ACM conference on Computer and communications security, 2009, pp. 477-487.
[8] Y. Fu and Z. Lin, 'Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection,' in 2012 IEEE Symposium on Security and Privacy, 2012, pp. 586-600.
[9] B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee, 'Virtuoso: Narrowing the semantic gap in virtual machine introspection,' in 2011 IEEE Symposium on Security and Privacy, 2011, pp. 297-312.
[10] R. Uhlig, G. Neiger, D. Rodgers, A. L. Santoni, F. C. Martins, A. V. Anderson, et al., 'Intel virtualization technology,' Computer, vol. 38, pp. 48-56, 2005.
[11] A. M. D. corporation, AMD64 Virtualization Codenamed“Pacifica” Technology Secure Virtual Machine Architecture Reference Manual: Advanced Micro Devices corporation, 2005.
[12] F. Bellard, 'QEMU, a fast and portable dynamic translator,' in USENIX Annual Technical Conference, FREENIX Track, 2005, pp. 41-46.
[13] A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori, 'kvm: the Linux virtual machine monitor,' in Proceedings of the Linux symposium, 2007, pp. 225-230.
[14] T. Garfinkel and M. Rosenblum, 'A Virtual Machine Introspection Based Architecture for Intrusion Detection,' in NDSS, 2003, pp. 191-206.
[15] J. Pfoh, C. Schneider, and C. Eckert, 'Nitro: Hardware-based system call tracing for virtual machines,' in International Workshop on Security, 2011, pp. 96-112.
[16] A. Dinaburg, P. Royal, M. Sharif, and W. Lee, 'Ether: malware analysis via hardware virtualization extensions,' in Proceedings of the 15th ACM conference on Computer and communications security, 2008, pp. 51-62.
[17] C. Willems, R. Hund, and T. Holz, 'Cxpinspector: Hypervisor-based, hardware-assisted system monitoring,' Ruhr-Universitat Bochum, Tech. Rep, p. 12, 2013.
[18] Z. Deng, X. Zhang, and D. Xu, 'Spider: Stealthy binary program instrumentation and debugging via hardware virtualization,' in Proceedings of the 29th Annual Computer Security Applications Conference, 2013, pp. 289-298.
[19] I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer, 'A secure environment for untrusted helper applications: Confining the wily hacker,' in Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography, 1996, pp. 1-1.
[20] M. Bailey, E. Cooke, F. Jahanian, and D. Watson, 'The blaster worm: Then and now,' IEEE Security & Privacy, vol. 3, pp. 26-31, 2005.
[21] P. M. Chen and B. D. Noble, 'When virtual is better than real [operating system relocation to virtual machines],' in Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on, 2001, pp. 133-138.
[22] Y.-N. Chen, '結合動態被動分析與主動探測之有效虛擬環境殭屍軟體及時偵測,' 臺灣大學資訊管理學研究所學位論文, pp. 1-33, 2012.
[23] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, et al., 'Xen and the art of virtualization,' in ACM SIGOPS Operating Systems Review, 2003, pp. 164-177.
[24] M. Egele, T. Scholte, E. Kirda, and C. Kruegel, 'A survey on automated dynamic malware-analysis techniques and tools,' ACM Computing Surveys (CSUR), vol. 44, p. 6, 2012.
[25] D. Sgandurra and E. Lupu, 'Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems,' ACM Computing Surveys (CSUR), vol. 48, p. 46, 2016.
[26] A. Velte and T. Velte, Microsoft virtualization with Hyper-V: McGraw-Hill, Inc., 2009.
[27] I. Corporation, Intel® 64 and IA-32 Architectures Software Developer's Manual vol. Combined Volumes:1, 2A, 2B, 2C, 3A, 3B and 3C: Intel Corporation, 2015.
[28] P. J. Denning, 'Virtual memory,' ACM Computing Surveys (CSUR), vol. 2, pp. 153-189, 1970.
[29] I. vmware, 'Virtualization: Architectural Considerations And Other Evaluation Criteria,' 2005.
[30] S. Sparks and J. Butler, 'Shadow walker: Raising the bar for rootkit detection,' Black Hat Japan, vol. 11, pp. 504-533, 2005.
[31] K. Chiang and L. Lloyd, 'A Case Study of the Rustock Rootkit and Spam Bot,' HotBots, vol. 7, pp. 10-10, 2007.
[32] S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, et al., 'Dksm: Subverting virtual machine introspection for fun and profit,' in Reliable Distributed Systems, 2010 29th IEEE Symposium on, 2010, pp. 82-91.
[33] H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh, 'On the effectiveness of address-space randomization,' in Proceedings of the 11th ACM conference on Computer and communications security, 2004, pp. 298-307.
[34] 李士暄, '基於虛擬機器內省記憶體檢測之虛擬化執行保護,' 2016.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/49955-
dc.description.abstract雲端產業的蓬勃發展使得企業傾向於使用此項科技來輔助企業的發展,伺服器整合已是無法抵禦的潮流。隨著伺服器的集中使用,集中點成為明顯的攻擊目標。了解程式行為會是一個很好的開始,透過了解程式行為方能過濾何者為高風險之行動,針對其作高精確度的防禦。本論文之最終目標為實作一套具彈性的實時程式行為側錄系統,其結果可基於安全的需要作為行為分析之用。
為了反制當代惡意程式所發展的反偵測技術,本論文透過使用虛擬化技術來使此監控行為不容易被發覺。如同許多過去的研究一般,屬於Virtual Machine Introspection (VMI) 技術之一類。隨著近代虛擬化技術的發展,硬體輔助虛擬化技術已成為標準配備之一。硬體輔助虛擬化技術帶來了顯著的效能增益,但改變了整體執行的架構與流程。
因此,本論文致力於在硬體輔助虛擬化機制下製造可有效的執行監控程式之空間,來協助程式行為監控的進行。為了要讓理解程式行為更簡單本論文將監測的基本單位至於較接近程式開發者熟悉的API call等級。API call等級的程式執行行為描繪比起傳統的系統呼叫(system call)具更高的語意價值,可更精確的了解程式行為,降低推論的複雜度。
由於API call的種類繁多並且功能豐富,本論文之系統可支援使用者自行設計之監控程式來因應API call的多樣性。並且提供API call執行前、後兩個執行時間點來幫助使用者取得API call之傳入參數以及其回傳值。此舉可使所錄製之行為描繪更貼近事實並且易於分析。
除了基本功能之外,本論文於系統設計時便將三個重點列入考慮:Transparency、Performance、Bridging the semantic gap。Transparency的兩個面向使得本系統不會受制於監控對象之作業系統選擇、不需安裝任何額外軟體,亦不會輕易的被作業系統內的防護機制查覺。執行本論文之系統不會使效能大幅度的下降,可享受硬體輔助虛擬化機制帶來的效能增益。最後,選擇API call作為觀察對象可使未來分析者更簡易但清楚地了解程式行為。
zh_TW
dc.description.abstractAs cloud computing prospers, server consolidation becomes a trending topic. In the mean time, it brought attention of attackers. In order to provide protection to cloud technology users, we must understand how these malicious activities function. This thesis presents a way to record program behavior through API redirection.
While traditional IDS can provide protection against sophisticated attacks, it is also vulnerable to anti-detection mechanisms like anti-debugging and anti-instrumentation developed by attackers. Virtual machine introspection (VMI) technology moves IDS out of operating system to avoid such anti-detection mechanisms.
With the aid of hardware-assisted virtualization technology, virtualization’s performance has increased significantly. However, the adaptation of such technology brings significant change to how virtualization functions. The change affected many existing VMI-based system, making it impossible to work as it was designed.
This thesis aimed to solve this and build a VMI-based API redirection system on 64-bit hardware-assisted technology enabled machine. Additionally, three more aspects are considered throughout the design: Transparency, Performance, and bridging the semantic gap. By achieving all goals, we will have a system that requires no additional software installation, incur low performance overhead, and generates execution traces with higher semantic value. The results can be further analyzed to understand program behavior.
en
dc.description.provenanceMade available in DSpace on 2021-06-15T12:26:45Z (GMT). No. of bitstreams: 1
ntu-105-R03725037-1.pdf: 1306203 bytes, checksum: 9f5987c0fdcd2dd57f39436f75be5ed9 (MD5)
Previous issue date: 2016
en
dc.description.tableofcontents口試委員會審定書 ii
誌謝 iii
中文摘要 iv
ABSTRACT v
目錄 vi
圖目錄 ix
表目錄 xi
Chapter 1 研究動機 1
Chapter 2 文獻探討 6
2.1 VMI技術基礎 6
2.2 軟體模擬虛擬化(software-based emulation) 6
2.3 雙虛擬機器方法(dual VM approach) 7
2.4 硬體輔助虛擬化(hardware-assisted virtualization) 8
2.5 系統差異比較與討論 9
Chapter 3 背景知識 10
3.1 虛擬化技術 10
3.1.1 Binary Translation 12
3.1.2 Hardware-assisted Virtualization 13
3.1.3 Quick Emulator (Qemu) 16
3.1.4 Kernel Virtual Machine (KVM) 17
3.2 虛擬記憶體 (Virtual Memory) 及位址轉換(Address Translation) 19
Chapter 4 VMI Profiling Mechanism 24
4.1 威脅模型 24
4.2 設計目標 25
4.3 Method 27
4.3.1 檢查目前正要被執行的執行程序是否是側錄目標 27
4.3.2 虛擬化執行環境下的address translation 28
4.3.3 將側錄程式碼嵌入系統。 28
4.3.4 取得空間安置側錄程式碼及紀錄(logging)碼及資料紀錄區 29
4.3.5 in-memory紀錄架構 29
4.4 系統設計 30
4.4.1 偵測下一個執行的程式為何 30
4.4.2 虛擬化執行環境下的address translation 30
4.4.3 將側錄程式碼嵌入系統 31
4.4.4 取得空間安置側錄程式碼及紀錄(logging)碼及資料紀錄區 31
Chapter 5 系統實作 33
5.1 從開機到開始偵測 34
5.2 安插空間與程式碼 35
5.2.1 Reverse mapping 35
5.2.2 API redirection 38
5.3 正常執行 39
Chapter 6 實驗 42
6.1 實驗一、創造可使用空間 42
6.2 實驗二、不影響非指定之程式 44
Chapter 7 結論 46
Chapter 8 參考文獻 47
dc.language.isozh-TW
dc.subject虛擬化zh_TW
dc.subject硬體輔助虛擬化zh_TW
dc.subjectAPI重導zh_TW
dc.subject程式行為側錄zh_TW
dc.subject虛擬記憶體zh_TW
dc.subject虛擬化zh_TW
dc.subject硬體輔助虛擬化zh_TW
dc.subjectAPI重導zh_TW
dc.subject程式行為側錄zh_TW
dc.subject虛擬記憶體zh_TW
dc.subjectprogram profilingen
dc.subjectAPI redirectionen
dc.subjecthardware-assisted virtualizationen
dc.subjectAPI redirectionen
dc.subjecthardware-assisted virtualizationen
dc.subjectVirtualizationen
dc.subjectvirtual memoryen
dc.subjectVirtualizationen
dc.subjectprogram profilingen
dc.subjectvirtual memoryen
dc.title基於虛擬機內省API重導之執行防禦系統核心zh_TW
dc.titleVMI based API redirection for run time protectionen
dc.typeThesis
dc.date.schoolyear104-2
dc.description.degree碩士
dc.contributor.oralexamcommittee陳孟彰(Meng-Chang Chen),李漢銘(Hahn-Ming Lee),李育傑(Yuh-Jye Lee),謝錫(方方土)
dc.subject.keyword虛擬化,虛擬記憶體,程式行為側錄,API重導,硬體輔助虛擬化,zh_TW
dc.subject.keywordVirtualization,virtual memory,program profiling,API redirection,hardware-assisted virtualization,en
dc.relation.page48
dc.identifier.doi10.6342/NTU201602165
dc.rights.note有償授權
dc.date.accepted2016-08-10
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-105-1.pdf
  未授權公開取用
1.28 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved