引用本文
  • 陈阳,贾晓启,杜海超,解亚敏,周梦婷.VMM漏洞动态挖掘方法综述[J].信息安全学报,已采用    [点击复制]
  • Chen Yang,Jia Xiaoqi,Du Haichao,Xie Yamin,Zhou Mengting.A Survey of VMM Dynamic Vulnerability Discovering Methods[J].Journal of Cyber Security,Accept   [点击复制]
【打印本页】 【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

过刊浏览    高级检索

本文已被:浏览 2958次   下载 0  
VMM漏洞动态挖掘方法综述
陈阳, 贾晓启, 杜海超, 解亚敏, 周梦婷
0
(中国科学院信息工程研究所 北京 中国)
摘要:
系统虚拟化是云计算的核心技术,其通过虚拟机监控器(Virtual Machine Monitor,VMM)实现对物理资源的抽象和管理。VMM 的安全性对于保障云平台的稳定性和用户数据的保密性至关重要。然而,由于VMM的功能复杂、代码量大、攻击面广,VMM 面临着多种安全威胁并且容易产生漏洞。一旦VMM出现漏洞就可能导致云平台的崩溃、用户数据的泄露等重大的安全后果。因此,研究VMM漏洞挖掘方法具有重要的理论意义和实际价值。本文主要关注漏洞动态挖掘方法,它是指通过构造样本输入目标软件,进而触发目标软件执行异常,最终定位其中漏洞和缺陷的一种方法。VMM的漏洞挖掘方法一直是系统虚拟化领域的研究热点,然而由于VMM自身架构和应用场景等方面的特殊性,传统的漏洞挖掘方法在应用于 VMM时存在着诸多挑战,需要进行针对性的改进和优化。本文首先介绍了VMM的分类、虚拟化技术、VMM 漏洞的危害以及常规软件的漏洞挖掘方法。之后,本文着重阐述了漏洞挖掘方法在VMM方面的应用和进展。本文根据研究目标的不同将VMM漏洞挖掘方法分成针对CPU虚拟化和内存虚拟化的研究方案,以及针对I/O虚拟化的研究方案。本文还分别对两类研究目标的安全漏洞挖掘方法的特点进行了总结和对比。本文介绍了这些方法以及代表工作的优势和局限性。最后,本文对当前漏洞挖掘方法中所关注的热点问题和未来的研究方向进行了展望。
关键词:  虚拟机监控器  虚拟化安全  漏洞挖掘方法
DOI:
投稿时间:2023-10-19修订日期:2023-12-29
基金项目:国家自然科学基金项目(面上项目,重点项目,重大项目)
A Survey of VMM Dynamic Vulnerability Discovering Methods
Chen Yang, Jia Xiaoqi, Du Haichao, Xie Yamin, Zhou Mengting
(Institute of Information Engineering,Chinese Academy of Sciences)
Abstract:
System virtualization is the core technology of cloud computing, which realizes the abstraction and management of physical resources through the virtual machine monitor (VMM). The security of VMM is crucial for ensuring the stability of the cloud platform and the confidentiality of user data. However, due to the complexity, large code size, and wide attack surface of VMM, it faces various security threats and is prone to vulnerabilities. Once VMM has a vulnerability, it may lead to serious security consequences such as the collapse of the cloud platform, the leakage of user data, etc. Therefore, researching VMM vulnerability discovering methods has important theoretical significance and practical value. This article primarily focuses on the dynamic vulnerability discovering method, which refers to a technique that involves crafting sample inputs to target software, thereby triggering abnormal execution of the software, and ultimately pinpointing the vulnerabilities and defects within it. VMM vulnerability discovering methods have always been a hot topic in the field of system virtualization, but due to the particularity of VMM in terms of its own architecture and application scenarios, traditional vulnerability discovering methods face many challenges when applied to VMM, and need to be improved and optimized for specific purposes. This paper first introduces the classification, virtualization technology, VMM vulnerability hazards, and vulnerability discovering methods of conventional software. Then, this paper focuses on the application and progress of vulnerability dis-covering methods in VMM. This paper divides VMM vulnerability discovering methods into research schemes for CPU virtualization and memory virtualization, and research schemes for I/O virtualization according to different research objectives. This paper also summarizes and compares the characteristics of security vulnerability discovering methods for two types of research objectives. This paper introduces the advantages and limitations of these methods and representative works. Finally, this paper looks forward to the hot issues and future research directions in the current vulnerability discovering.
Key words:  virtual machine monitor  virtualization security  vulnerability discovering methods