Some context-sensitive DLP systems work ac-
cording to coarse security policies, such as preventing
users from using removable media (Halpert, 2004).
DLP-Visor provides a more fine-grained configura-
tion of sensitive and restricted locations.
The idea of sensitiveness that spreads between
files touched by processes was first introduced in
(Petkovic et al., 2012). The authors proposed a kernel
module for the Linux operating system that monitors
the operations performed on the filesystem. Specifi-
cally, after a process performs a read from a sensitive
file, all its subsequent writes mark the target files as
sensitive. DLP-Visor generalises this idea to the clip-
board, memory and network channels, and adapts to
the Windows operating system.
UC4Win (W
¨
uchner and Pretschner, 2012) is prob-
ably closest to DLP-Visor’s approach. UC4Win mon-
itors system calls and matches them against a set
of predefined rules. The rules determine whether
the system call shall be allowed. Unlike DLP-
Visor, UC4Win uses user-mode interception of sys-
tem, which can be easily circumvented.
Virtual machine introspection allows the hypervi-
sor to intercept various events occurring in the operat-
ing system. The first system to use virtualization ex-
tensions for introspection was Ether (Dinaburg et al.,
2008), which used page-faults for system call trac-
ing. We showed that interception of page-faults can
severely degrade overall system performance.
Spider (Deng et al., 2013) is a stealthy breakpoint
installation framework based on KVM, a full hyper-
visor. Spider is suitable for installing breakpoints in
user-mode applications. The idea of stealthy break-
points was later extended in Drakvuf (Lengyel et al.,
2014), which is based on Xen, another full hypervi-
sor. As shown by our experimental results, full hyper-
visors have a much higher performance overhead than
thin hypervisors, like DLP-Visor. Recently, Drakvuf
was ported to ARM (Proskurin et al., 2018), Because
Drakvuf and DLP-Visor use similar underlying mech-
anisms, we believe that DLP-Visor can be ported as
well.
7 CONCLUSIONS
In this paper, we presented DLP-Visor, a hypervisor-
based context-sensitive data leakage prevention sys-
tem. We showed that the performance overhead al-
lows DLP-Visor to be deployed in practice. Despite
the limitations imposed by current implementation of
DLP-Visor, it can be applied to most real-world appli-
cations. We believe that future versions of DLP-Visor
will address these limitations.
REFERENCES
Alneyadi, S., Sithirasenan, E., and Muthukkumarasamy, V.
(2016). A survey on data leakage prevention sys-
tems. Journal of Network and Computer Applications,
62:137–152.
Checkpoint (2017 (accessed Sep 19, 2020)). Data Loss Pre-
vention Software Blade. Checkpoint.
Cook, K. (2013). Kernel address space layout randomiza-
tion. Linux Security Summit.
Deng, Z., Zhang, X., and Xu, D. (2013). Spider: Stealthy
binary program instrumentation and debugging via
hardware virtualization. In Proceedings of the 29th
Annual Computer Security Applications Conference,
pages 289–298.
Dinaburg, A., Royal, P., Sharif, M., and Lee, W. (2008).
Ether: malware analysis via hardware virtualization
extensions. In Proceedings of the 15th ACM con-
ference on Computer and communications security,
pages 51–62.
Field, S. (2006). An introduction to kernel patch protection.
Google (2016 (accessed Sep 19, 2020)). Scan your email
traffic using data loss prevention.
Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., and Choo, K.-
K. R. (2016). Fine-grained database field search us-
ing attribute-based encryption for e-healthcare clouds.
Journal of medical systems, 40(11):235.
Halpert, B. (2004). Mobile device security. In Proceedings
of the 1st annual conference on Information security
curriculum development, pages 99–101.
Kantor, A., Antebi, L., Kirsch, Y., and Bialik, U. (2012).
Methods for document-to-template matching for data-
leak prevention. US Patent 8,254,698.
Khati, L., Mouha, N., and Vergnaud, D. (2017). Full disk
encryption: bridging theory and practice. In Cryp-
tographers’ Track at the RSA Conference, pages 241–
257. Springer.
Lengyel, T. K., Maresca, S., Payne, B. D., Webster, G. D.,
Vogl, S., and Kiayias, A. (2014). Scalability, fidelity
and stealth in the drakvuf dynamic malware analysis
system. In Proceedings of the 30th Annual Computer
Security Applications Conference, pages 386–395.
Li, J., Chen, N., and Zhang, Y. (2019). Extended file hier-
archy access control scheme with attribute based en-
cryption in cloud computing. IEEE Transactions on
Emerging Topics in Computing.
McAfee (2017 (accessed Sep 19, 2020)). Total Protection
for Data Loss Prevention (DLP).
Microsoft (2018 (accessed Sep 19, 2020)b). Microsoft pub-
lic symbol server.
Microsoft (2020 (accessed Sep 19, 2020)a). Data loss pre-
vention in Exchange Server.
Petkovic, M., Popovic, M., Basicevic, I., and Saric, D.
(2012). A host based method for data leak protec-
tion by tracking sensitive data flow. In 2012 IEEE
19th International Conference and Workshops on En-
gineering of Computer-Based Systems, pages 267–
274. IEEE.
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
422