Visible to the public Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions

TitleTransitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions
Publication TypeConference Paper
Year of Publication2016
AuthorsHaq, M. S. Ul, Lejian, L., Lerong, M.
Conference Name2016 International Symposium on Computer, Consumer and Control (IS3C)
ISBN Number978-1-5090-3071-2
Keywordscode vulnerabilities, composability, confined malicious application, execution overheads, file system access, governance, Government, Hardware, Hardware virtualization, hardware virtualization extensions, isolation, Kernel, kernel operating system, Libraries, Linux, Linux process, Memory management, operating system, operating system kernels, operating system service virtualization, policy, policy-based governance, process maliciousness, process virtual machine, program flow control, pubcrawl, sandbox, Sandboxing, security, system call virtualization, untrusted application behaviour control, untrusted application behaviour monitoring, virtual machine equivalent isolation, virtual machines, Virtual machining, virtualisation, virtualization
Abstract

In presence of known and unknown vulnerabilities in code and flow control of programs, virtual machine alike isolation and sandboxing to confine maliciousness of process, by monitoring and controlling the behaviour of untrusted application, is an effective strategy. A confined malicious application cannot effect system resources and other applications running on same operating system. But present techniques used for sandboxing have some drawbacks ranging from scope to methodology. Some of proposed techniques restrict specific aspect of execution e.g. system calls and file system access. In the same way techniques that truly isolate the application by providing separate execution environment either require modification in kernel or full blown operating system. Moreover these do not provide isolation from top to bottom but only virtualize operating system services. In this paper, we propose a design to confine native Linux process in virtual machine equivalent isolation by using hardware virtualization extensions with nominal initialization and acceptable execution overheads. We implemented our prototype called Process Virtual Machine that transition a native process into virtual machine, provides minimal possible execution environment, intercept and virtualize system calls to execute it on host kernel. Experimental results show effectiveness of our proposed technique.

URLhttps://ieeexplore.ieee.org/document/7545218/
DOI10.1109/IS3C.2016.108
Citation Keyhaq_transitioning_2016