Visible to the public HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation

TitleHyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation
Publication TypeConference Paper
Year of Publication2019
AuthorsLiu, Wenqing, Zhang, Kun, Tu, Bibo, Lin, Kunli
Conference Name2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
Date PublishedAug. 2019
PublisherIEEE
ISBN Number978-1-7281-2058-4
Keywordscloud computing, cloud environment, Collaboration, guest virtual machine security, Human Behavior, human factors, HyperPS, hypervisor monitoring, hypervisor security, Kernel, KVM hypervisor, Linux, Logic gates, Metrics, microhypervisor reducing attack surface, Monitoring, monolithic operating system, operating system kernels, policy-based governance, privilege separation, pubcrawl, Registers, resilience, Resiliency, Safe Coding, security, security of data, security-sensitive system resources, system monitoring, system software error, Trusted Computing, trusted environment, Virtual machine monitors, virtual machines, virtualization
Abstract

In monolithic operating system (OS), any error of system software can be exploit to destroy the whole system. The situation becomes much more severe in cloud environment, when the kernel and the hypervisor share the same address space. The security of guest Virtual Machines (VMs), both sensitive data and vital code, can no longer be guaranteed, once the hypervisor is compromised. Therefore, it is essential to deploy some security approaches to secure VMs, regardless of the hypervisor is safe or not. Some approaches propose microhypervisor reducing attack surface, or a new software requiring a higher privilege level than hypervisor. In this paper, we propose a novel approach, named HyperPS, which separates the fundamental and crucial privilege into a new trusted environment in order to monitor hypervisor. A pivotal condition for HyperPS is that hypervisor must not be allowed to manipulate any security-sensitive system resources, such as page tables, system control registers, interaction between VM and hypervisor as well as VM memory mapping. Besides, HyperPS proposes a trusted environment which does not rely on any higher privilege than the hypervisor. We have implemented a prototype for KVM hypervisor on x86 platform with multiple VMs running Linux. KVM with HyperPS can be applied to current commercial cloud computing industry with portability. The security analysis shows that this approach can provide effective monitoring against attacks, and the performance evaluation confirms the efficiency of HyperPS.

URLhttps://ieeexplore.ieee.org/document/8855586/
DOI10.1109/HPCC/SmartCity/DSS.2019.00141
Citation Keyliu_hyperps_2019