Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems

Denis Efremov, Nikolay Pakulin

2012

Abstract

This project is an attempt to combine the advantages of software flexibility and security of hardware firewalls. It aims at the implementation of these advantages in the hypervisor source code for the purpose of creating user data confidentiality protection against its leakage from the personal computer through the network. The hypervisor implementation is based on the hardware virtualization extensions of both processors and motherboards. This constitutes a key feature, which enables hypervisor to combine the following advantages: the advantages of access to the OS environment and hardware protection against various intruders’ methods of compromise, including those capable of exploiting OS kernel resources for performing the malicious actions.

References

  1. (2008). AMD-VTMNested Paging. Advanced Micro Devices Inc.
  2. (2011). AMD64 Architecture Programmer's Manual Volume 2: System Programming. Advanced Micro Devices Inc.
  3. Chen, X., Garfinkel, T., Lewis, E. C., Subrahmanyam, P., Waldspurger, C. A., Boneh, D., Dwoskin, J., and Ports, D. R. (2008). Overshadow: a virtualizationbased approach to retrofitting protection in commodity operating systems. In ASPLOS XIII: Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, pages 2-13, New York, NY, USA. ACM.
  4. LeVasseur, J., Uhlig, V., Stoess, J., and Götz, S. (2004). Unmodified device driver reuse and improved system dependability via virtual machines. In OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, pages 2-2, Berkeley, CA, USA. USENIX Association.
  5. Ta-Min, R., Litty, L., and Lie, D. (2006). Splitting interfaces: making trust between applications and operating systems configurable. In OSDI 7806: Proceedings of the 7th symposium on Operating systems design and implementation, pages 279-292, Berkeley, CA, USA. USENIX Association.
  6. Yang, J. and Shin, K. G. (2008). Using hypervisor to provide data secrecy for user applications on a perpage basis. In Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, VEE 7808, pages 71-80, New York, NY, USA. ACM.
Download


Paper Citation


in Harvard Style

Efremov D. and Pakulin N. (2012). Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 395-398. DOI: 10.5220/0004070103950398


in Bibtex Style

@conference{secrypt12,
author={Denis Efremov and Nikolay Pakulin},
title={Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={395-398},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004070103950398},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems
SN - 978-989-8565-24-2
AU - Efremov D.
AU - Pakulin N.
PY - 2012
SP - 395
EP - 398
DO - 10.5220/0004070103950398