space traveling across vmlin.3021/file/sp12...background and the problem state-of-the-art our...

25
Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Space Traveling across VM Automatically Bridging the Semantic-Gap in Virtual Machine Introspection via Online Kernel Data Redirection Yangchun Fu, and Zhiqiang Lin Department of Computer Sciences The University of Texas at Dallas May 23 rd , 2012

Upload: others

Post on 24-Mar-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Space Traveling across VMAutomatically Bridging the Semantic-Gap in Virtual Machine

Introspection via Online Kernel Data Redirection

Yangchun Fu, and Zhiqiang Lin

Department of Computer SciencesThe University of Texas at Dallas

May 23rd , 2012

Page 2: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Outline

1 Background and The Problem

2 State-of-the-Art

3 Our Approach: Data Space Traveling

4 Conclusion

Page 3: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Cloud Runs Virtual Machines (VM)

Hardware Layer

Virtualization Layer

Product‐VM Product‐VM Product‐VM

Linux Win‐7

..Windows XP

Consolidation,Multiplexing, Migration,Isolation, Encapsulation,Interposition, Security,Reliability, Dependability...

VMI [Garfinkel and Rosenblum,NDSS’03]

Page 4: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Virtual Machine Introspection (VMI) [Garfinkel and Rosenblum]

Hardware Layer

Virtualization Layer

Secure‐VM Product‐VM Product‐VM

Linux Win‐7

..Introspect

A Trusted OSUsing a trusted, isolated,dedicated VM to monitorother VMs

Intrusion DetectionMalware AnalysisMemory Forensics

Semantic Gap Problem

Page 5: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

The Semantic Gap in VMI ([Chen and Noble HotOS’01])

Product‐VM

Linux

..A Trusted OS

IntrospectSecure‐VM Semantic Gap

View exposed by Virtual Machine Monitor is at low-levelThere is no abstraction and no APIsNeed to reconstruct the guest-OS abstraction

Page 6: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Example: Inspect pids of Guest Memory from VMM

…00001800 eb 40 1b 02 63 74 00 f0 00 00 00 00 00 00 00 00 |[email protected]..........|00001810 00 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 |................|00001820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|00001830 00 00 00 00 00 00 00 00 10 76 16 cc 00 00 00 00 |.........v......|00001840 00 19 66 8c d0 50 b8 08 00 00 00 66 8e d0 53 8b |..f..P.....f..S.|00001850 d9 ff 2d 19 02 00 00 0f 20 c0 0f ba f0 1f 0f 22 |..-..... ......"|00001860 c0 eb 00 b9 80 00 00 c0 0f 32 0f ba f0 08 0f 30 |.........2.....0|00001870 0f 20 e0 0f ba f0 05 0f 22 e0 60 9c 8b d3 c1 ea |. ......".`.....|00001880 04 89 a3 76 02 00 00 0f 01 83 80 02 00 00 0f 01 |...v............|00001890 8b 88 02 00 00 8b 8b 3c 00 00 00 0b c9 74 12 8b |.......<.....t..|000018a0 b3 38 00 00 00 8b fb 81 c7 00 30 00 00 2b f9 f3 |.8........0..+..|000018b0 a4 0f 01 9b 90 02 00 00 0f 01 93 68 02 00 00 66 |...........h...f|000018c0 b8 10 00 66 8e d8 66 8e c0 66 8e d0 66 8e e0 66 |...f..f..f..f..f|…*00100f60 00 00 00 00 00 00 00 00 00 f0 ff 5d 76 e3 f0 2f |...........]v../|00100f70 93 c9 a4 1d f9 48 be f8 6c c7 1d 92 4c 1e 6e 35 |.....H..l...L.n5|00100f80 b4 f8 1b ae f6 69 e8 c0 b7 34 74 a1 4e 5a a7 93 |.....i...4t.NZ..|00100f90 97 2f f3 47 cf d7 10 df f0 d6 e3 9b f5 cf a9 23 |./.G...........#|00100fa0 cd 9f 87 4f 37 7f 1e f1 fe dc 7d b9 f9 f3 7b ef |...O7.....}...{.|00100fb0 cf 95 bf 94 3f 8d 63 9a cc 8a 36 5b 56 7b d2 76 |....?.c...6[V{.v|00100fc0 b6 d9 ad ee 61 f6 90 a4 2c 2b 54 66 37 de 3d a9 |....a...,+Tf7.=.|00100fd0 b9 d9 67 37 1e 7a b5 ce ef 0c 58 ee 4d 30 d0 9b |..g7.z....X.M0..|00100fe0 c0 6e bc e7 3d f3 e7 d0 9a bf a4 82 1b c7 9c f1 |.n..=...........|00100ff0 db 66 2b d8 38 cb 2a 91 80 ad 7d 25 d8 0a e5 db |.f+.8.*...}%....|

Virtual Machine Monitor Layer

DISK

…00001800 eb 40 1b 02 63 74 00 f0 00 00 00 00 00 00 00 00 |[email protected]..........|00001810 00 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 |................|00001820 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|00001830 00 00 00 00 00 00 00 00 10 76 16 cc 00 00 00 00 |.........v......|00001840 00 19 66 8c d0 50 b8 08 00 00 00 66 8e d0 53 8b |..f..P.....f..S.|00001850 d9 ff 2d 19 02 00 00 0f 20 c0 0f ba f0 1f 0f 22 |..-..... ......"|00001860 c0 eb 00 b9 80 00 00 c0 0f 32 0f ba f0 08 0f 30 |.........2.....0|00001870 0f 20 e0 0f ba f0 05 0f 22 e0 60 9c 8b d3 c1 ea |. ......".`.....|00001880 04 89 a3 76 02 00 00 0f 01 83 80 02 00 00 0f 01 |...v............|00001890 8b 88 02 00 00 8b 8b 3c 00 00 00 0b c9 74 12 8b |.......<.....t..|000018a0 b3 38 00 00 00 8b fb 81 c7 00 30 00 00 2b f9 f3 |.8........0..+..|000018b0 a4 0f 01 9b 90 02 00 00 0f 01 93 68 02 00 00 66 |...........h...f|000018c0 b8 10 00 66 8e d8 66 8e c0 66 8e d0 66 8e e0 66 |...f..f..f..f..f|…*00100f60 00 00 00 00 00 00 00 00 00 f0 ff 5d 76 e3 f0 2f |...........]v../|00100f70 93 c9 a4 1d f9 48 be f8 6c c7 1d 92 4c 1e 6e 35 |.....H..l...L.n5|00100f80 b4 f8 1b ae f6 69 e8 c0 b7 34 74 a1 4e 5a a7 93 |.....i...4t.NZ..|00100f90 97 2f f3 47 cf d7 10 df f0 d6 e3 9b f5 cf a9 23 |./.G...........#|00100fa0 cd 9f 87 4f 37 7f 1e f1 fe dc 7d b9 f9 f3 7b ef |...O7.....}...{.|00100fb0 cf 95 bf 94 3f 8d 63 9a cc 8a 36 5b 56 7b d2 76 |....?.c...6[V{.v|00100fc0 b6 d9 ad ee 61 f6 90 a4 2c 2b 54 66 37 de 3d a9 |....a...,+Tf7.=.|00100fd0 b9 d9 67 37 1e 7a b5 ce ef 0c 58 ee 4d 30 d0 9b |..g7.z....X.M0..|00100fe0 c0 6e bc e7 3d f3 e7 d0 9a bf a4 82 1b c7 9c f1 |.n..=...........|00100ff0 db 66 2b d8 38 cb 2a 91 80 ad 7d 25 d8 0a e5 db |.f+.8.*...}%....|

Virtual Machine Monitor Layer

DISK

Kernel specific data structure definition

Kernel symbols (global variable)

Virtual to physical (V2P) translation

In Kernel 2.6.18

struct task_struct {...

[188] pid_t pid;[192] pid_t tgid;...

[356] uid_t uid;[360] uid_t euid;[364] uid_t suid;[368] uid_t fsuid;[372] gid_t gid;[376] gid_t egid;[380] gid_t sgid;[384] gid_t fsgid;...[428] char comm[16];...

}SIZE: 1408

Page 7: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

State-of-the-art

The Semantic Gap [Chen et al, HotOS’01]

In HotOS’01, Chen andNoble first raised thesemantic gap problem invirtualization

“Services in the VM operatebelow the abstractions providedby the guest OS ... This canmake it difficult to provideservices.”

Page 8: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

State-of-the-art

The Semantic Gap [Chen et al, HotOS’01]

VMI[Garfinkel et al, NDSS’03]

In NDSS’03, Garfinkel etal. first proposed VMI,demonstrated for IDSIntrospection routine isbased on crash utility

Page 9: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

State-of-the-art

The Semantic Gap [Chen et al, HotOS’01]

VMI[Garfinkel et al, NDSS’03]

VMWatcher[Jiang et al, CCS’07]

In CCS’07, Jiang et al.proposed VMwatcherIntrospection routine isbased on manuallycreated code

Target VM

Target Kernel

Virtual Machine Monitor

VMwatcher

Page 10: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

State-of-the-art

The Semantic Gap [Chen et al, HotOS’01]

VMI[Garfinkel et al, NDSS’03]

SBCFI[Petroni et al, CCS’07]

VMWatcher[Jiang et al, CCS’07]

In CCS’07, Petroni et al.proposed SBCFIIntrospection routine isbased on customizedkernel source code

Target VM

Target Kernel

Virtual Machine Monitor

User App

Monitor VM

OS Kernel

CFI Monitor

Page 11: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

State-of-the-art

The Semantic Gap [Chen et al, HotOS’01]

VMI[Garfinkel et al, NDSS’03]

SBCFI[Petroni et al, CCS’07]

VMWatcher[Jiang et al, CCS’07]

Virtuoso[Dolan‐Gavitt et al., SP’11]

In SP’11, Dolan-Gavitt etal. proposed VirtuosoIntrospection routine isbased on the traineduser level and kernellevel code

VirtuosoOakland ’11 5/24/2011

Overview

13

Runtime

Introspection Program

COPY

ON

WRITE

Security VM Untrusted VM

User

Kernel

Runtime Phase

Tuesday, May 24, 2011

Page 12: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

State-of-the-art

The Semantic Gap [Chen et al, HotOS’01]

VMI[Garfinkel et al, NDSS’03]

SBCFI[Petroni et al, CCS’07]

VMWatcher[Jiang et al, CCS’07]

VMST[Our solution, SP’12]

Virtuoso[Dolan‐Gavitt et al., SP’11]

In SP’12, we propose VMSpace Traveler (VMST).Introspection routine isautomatically generatedfrom the native user leveland kernel level code

KernelData

KernelCode

Applications

Product-VM

Kernel

Common Utilities

Secure-VM

COW

R/OR/W

pslsmod netstat

Syscall ExecutionContext

Identification

RedirectableData

Identification

Kernel DataRedirection

VM-Space Traveler

Introspection

...

...

Page 13: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Key Idea

Data can be transferredIn Internet, data is transferredthough network packet

Insight

An inspection program P(µ, k) is often composed of staticbinary code P, runtime dynamic user-level data µ (includinguser-level stack, heap, and global variables), and inspectedkernel data k .

Transfer kernel space data kfrom one machine to the othermov eax, [0x1c0eff08]

Page 14: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Principles

Principles

P ′(µ, k) = P(µ, k ′), whereP ′ is the new introspection programP is the old inspection programµ is the user level datak is the kernel data bing inspectedk ′ is from other machine

OutcomeWe reuse legacy binary code of P to automatically generatenew program P ′

Page 15: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

How?

strace of a getpid program 1 execve("./getpid",..) = 0 2 brk(0) = 0x83b8000 3 access("/etc/ld.so.nohwcap",..) = -123 getpid() = 13849

26 write(1, "pid=13849\n", 10) = 10 27 exit_group(0) = ?

Three Key Components

Syscall execution context identification

Redirectable data identification

Kernel data redirection Kernel

Common Utilities

Secure-VM

pslsmod netstat

Syscall ExecutionContext

Identification

RedirectableData

Identification

Kernel DataRedirection

...

1 execve("/sbin/lsmod", ["lsmod"],..) = 0 2 brk(0) = 0x602000 3 access("/etc/ld.so.nohwcap", F_OK) = -1 28 open("/proc/modules", O_RDONLY) = 3 32 fstat(3, ...}) = 0 34 read(3, "ip6table_filter"...) = 1024 94 munmap(0x7f6717b91000, 4096) = 0 95 exit_group(0) = ?

Page 16: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

I. Syscall Execution Context Identification

Interrupt

Handler

sysenter/int 0x80

sysexit/iretd

Syscall Service

Routine

Context

Switch

Exception

Handler

One intuitive approachHard-code all the startingand ending PC of

InterruptExceptionContext switch

Our OS-agnostic solution

Instrument VMM interrupt/exception handler to capture thestarting and ending point of interrupt/exceptionDisable the context switch by disabling the timer

Page 17: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

II. Redirectable Data Identification

Challenges

Identify kernel stack data (kernel control flow related)Differentiate kernel stack, heap, and global variableDifferentiate kernel code and data

Our solution: a variant of dynamic data flow analysisIdentify the kernel global and kernel heap (derived fromkernel global), and redirect their memory access

Alternatively, identify only the stack variable (derived fromesp), and no redirection for them.

Page 18: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

III. Kernel Data Redirection

Kernel

Common Utilities

Secure-VM

pslsmod netstat

Syscall ExecutionContext

Identification

RedirectableData

Identification

Kernel DataRedirection

...

1 execve("/sbin/lsmod", ["lsmod"],..) = 0 2 brk(0) = 0x602000 3 access("/etc/ld.so.nohwcap", F_OK) = -1 28 open("/proc/modules", O_RDONLY) = 3 32 fstat(3, ...}) = 0 34 read(3, "ip6table_filter"...) = 1024 94 munmap(0x7f6717b91000, 4096) = 0 95 exit_group(0) = ?

The Algorithm

1: DynamicInstInstrument(i):2: if SysExecContext(s):3: if SysRedirect(s):4: RedirectableDataTracking(i);5: for α in MemoryAddress(i):6: if DataRead(α):7: PA(α)← V2P(α)8: Load(PA(α))9: else:10: if NotDirty(α):11: CopyOnWritePage(α)12: UpdatePageEntryInSTLB(α)13: PA(α)← V2P(α)14: Store(PA(α))

Page 19: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Architecture

KernelData

KernelCode

Applications

Product-VM

Kernel

Common Utilities

Secure-VM

COW

R/OR/W

pslsmod netstat

Syscall ExecutionContext

Identification

RedirectableData

Identification

Kernel DataRedirection

VM-Space Traveler

Introspection

...

...

Page 20: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Automatic VMI Tool Generation

Utilities Syntax? Semantics?w/ options Description (diff) (Manual)

ps -A Reports a snapshot of all processes 7 Xlsmod Shows the status of modules X X

lsof -c p Lists opened files by a process p X Xipcs Displays IPC facility status X X

netstat -s Displays network statistics X Xuptime Reports how long the system running 7 X

ifconfig Reports network interface parameters X Xuname -a Displays system information X X

arp Displays ARP tables X Xfree Displays amount of free memory 7 Xdate Print the system date and time 7 X

pidstat Reports statistics for Linux tasks 7 Xmpstat Reports CPU related statistics 7 Xiostat Displays I/O statistics 7 Xvmstat Displays VM statistics 7 X

Page 21: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Performance Overhead

0%

20%

40%

60%

80%

100%ps

lsm

od

ipcs

upti

me

unam

e

ifco

nfi

g

arp

dat

e

pid

stat

mpst

at

iost

at

vm

stat

net

stat

uget

pid

Norm

aliz

ed P

erfo

rman

ce O

ver

hea

d

Benchmark Program

w/o VMI

w/ VMI

Page 22: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

OS-Agnostic TestingLinux Distribution Kernel Version Release Date OS-agnostic? LOC

Redhat-9 2.4.20-31 11/28/2002 7 53Fedora-6 2.6.18-1.2798.fc6 10/14/2006 7 53

Fedora-15 2.6.38.6-26.rc1.fc15 05/09/2011 X 0OpenSUSE-11.3 2.6.34-12-default 09/13/2010 X 0

2.6.35 08/10/2010 X 0OpenSUSE-11.4 2.6.37.1-1.2-default 02/17/2011 X 0

2.6.39.4 08/03/2011 X 0Debian 3.0 2.4.27-3 08/07/2004 7 53Debian 4.0 2.6.18-6 12/17/2006 7 53Debian 6.0 2.6.32-5 01/22/2010 X 0

2.6.32-rc8 02/09/2010 X 0Ubuntu-4.10 2.6.8.1-3 08/14/2004 7 53Ubuntu-5.10 2.6.12-9 08/29/2005 7 53

Ubuntu-10.04 2.6.32.27 12/09/2010 X 02.6.33 03/15/2010 X 02.6.34 07/05/2010 X 02.6.36 11/22/2010 X 0

2.6.37.6 03/27/2010 X 0Ubuntu-11.04 2.6.38-8-generic 06/03/2011 X 0Ubuntu-11.10 3.0.0-12-generic 08/05/2011 X 0

Page 23: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Limitations and Future Work

LimitationsNeed an identical trusted kernelNot entirely transparent to arbitrary OS kernels (relies onsyscall knowledge)Non-blocking system callDoes not inspect any disk data, memory swapped to disk

Future WorkKernel version inference in cloud VMPorting to Windows OSAddressing the non-blocking issue

Page 24: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Conclusion

VMST has automatically bridged the semantic gap, andautomatically generated the introspection tools by reusingthe legacy code (no training involved)

It also enables native VMI tool development.

(We hope) Cloud/VM/OS Providers, and AV-SoftwareVendors, could benefit from our techniques (for VMI andmemory forensics).

Page 25: Space Traveling across VMlin.3021/file/sp12...Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion Cloud Runs Virtual Machines (VM) Hardware Layer

Background and The Problem State-of-the-Art Our Approach: Data Space Traveling Conclusion

Thank You

KernelData

KernelCode

Applications

Product-VM

Kernel

Common Utilities

Secure-VM

COW

R/OR/W

pslsmod netstat

Syscall ExecutionContext

Identification

RedirectableData

Identification

Kernel DataRedirection

VM-Space Traveler

Introspection

...

...

[email protected]