2. Our hypervisor supports modern operating sys-
tems, e.g., Windows 10, by locating and copying
the delay-sensitive pages.
Section 5 presents the memory usage of the hypervi-
sor. We believe that this memory usage can be im-
proved by reducing the number of pages that the hy-
pervisor considers to be delay-sensitive.
REFERENCES
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T.,
Ho, A., Neugebauer, R., Pratt, I., and Warfield, A.
(2003). Xen and the art of virtualization. In ACM
SIGOPS operating systems review, volume 37, pages
164–177. ACM.
Ben-Yehuda, M., Xenidis, J., Ostrowski, M., Rister, K.,
Bruemmer, A., and Van Doorn, L. (2007). The price
of safety: Evaluating iommu performance. In The Ot-
tawa Linux Symposium, pages 9–20.
Brendmo, H. K. (2017). Live forensics on the windows 10
secure kernel. Master’s thesis, NTNU.
Carrier, B. D. and Grand, J. (2004). A hardware-based
memory acquisition procedure for digital investiga-
tions. Digital Investigation, 1(1):50–60.
Cohen, M. (2014). Rekall memory forensics framework.
DFIR Prague.
Durve, R. and Bouridane, A. (2017). Windows 10 secu-
rity hardening using device guard whitelisting and ap-
plocker blacklisting. In Emerging Security Technolo-
gies (EST), 2017 Seventh International Conference
on, pages 56–61. IEEE.
Evtyushkin, D., Ponomarev, D., and Abu-Ghazaleh, N.
(2016). Jump over aslr: Attacking branch predictors
to bypass aslr. In The 49th Annual IEEE/ACM Inter-
national Symposium on Microarchitecture, page 40.
IEEE Press.
Field, S. (2006). An introduction to kernel patch protec-
tion. http://blogs.msdn.com/b/windowsvistasecurity/
archive/2006/08/11/695993.aspx.
Intel Corporation (2018). Intel
R
64 and IA-32 Architec-
tures Software Developer’s Manual. Intel Corpora-
tion.
Kiperberg, M., Resh, A., and Zaidenberg, N. J.
(2015). Remote attestation of software and execution-
environment in modern machines. In Cyber Security
and Cloud Computing (CSCloud), 2015 IEEE 2nd In-
ternational Conference on, pages 335–341. IEEE.
Kiperberg, M. and Zaidenberg, N. (2013). Efficient re-
mote authentication. In Proceedings of the 12th Eu-
ropean Conference on Information Warfare and Secu-
rity: ECIW 2013, page 144. Academic Conferences
Limited.
Martignoni, L., Fattori, A., Paleari, R., and Cavallaro,
L. (2010). Live and trustworthy forensic analysis
of commodity production systems. In International
Workshop on Recent Advances in Intrusion Detection,
pages 297–316. Springer.
Microsoft Corporation (2009). Device\PhysicalMemory
Object. https://docs.microsoft.com/
en-us/previous-versions/windows/it-pro/
windows-server-2003/cc787565(v=ws.10). [On-
line; accessed 02-Nov-2018].
Microsoft Corporation (2018). KeIpiGenericCall function.
https://docs.microsoft.com/en-us/windows-hardware/
drivers/ddi/content/wdm/nf-wdm-keipigenericcall.
Oracle (2018). VirtualBox. https://www.virtualbox.org/.
Qi, Z., Xiang, C., Ma, R., Li, J., Guan, H., and Wei, D. S.
(2017). Forenvisor: A tool for acquiring and preserv-
ing reliable data in cloud live forensics. IEEE Trans-
actions on Cloud Computing, 5(3):443–456.
Reina, A., Fattori, A., Pagani, F., Cavallaro, L., and Br-
uschi, D. (2012). When hardware meets software: a
bulletproof solution to forensic memory acquisition.
In Proceedings of the 28th annual computer security
applications conference, pages 79–88. ACM.
Resh, A., Kiperberg, M., Leon, R., and Zaidenberg, N. J.
(2017). Preventing execution of unauthorized native-
code software. International Journal of Digital Con-
tent Technology and its Applications, 11.
Resh, A. and Zaidenberg, N. (2013). Can keys be hidden in-
side the cpu on modern windows host. In Proceedings
of the 12th European Conference on Information War-
fare and Security: ECIW 2013, page 231. Academic
Conferences Limited.
Russinovich, M. E., Solomon, D. A., and Ionescu, A.
(2012). Windows internals. Pearson Education.
Seshadri, A., Luk, M., Qu, N., and Perrig, A. (2007). Secvi-
sor: A tiny hypervisor to provide lifetime kernel code
integrity for commodity oses. In ACM SIGOPS Op-
erating Systems Review, volume 41, pages 335–350.
ACM.
Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K.,
Hasegawa, S., Horie, T., Hirano, M., Kourai, K.,
Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo,
Y., and Kato, K. (2009). Bitvisor: A thin hypervisor
for enforcing i/o device security. In Proceedings of
the 2009 ACM SIGPLAN/SIGOPS International Con-
ference on Virtual Execution Environments, VEE ’09,
pages 121–130, New York, NY, USA. ACM.
Unified EFI, Inc. (2006). Unified Extensible Firmware In-
terface Specification, Version 2.6.
VMware (2018). VMware Workstation Pro. https://www.
vmware.com/il/products/workstation-pro.html.
Zaidenberg, N. J. (2018). Hardware rooted security in in-
dustry 4.0 systems. In Dimitrov, K., editor, Cyber de-
fence in Industry 4.0 and Related Logistic and IT In-
frastructures, chapter 10, pages 135–151. IOS Press.
Zhang, L., Wang, L., Zhang, R., Zhang, S., and Zhou, Y.
(2010). Live memory acquisition through firewire. In
International Conference on Forensics in Telecommu-
nications, Information, and Multimedia, pages 159–
167. Springer.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
162