このエントリーをはてなブックマークに追加
ID 68931
Author
Sato, Masaya Okayama Prefectural University
Omori, Taku Okayama Prefectural University
Yamauchi, Toshihiro Okayama University ORCID Kaken ID publons researchmap
Taniguchi, Hideo Okayama University Kaken ID publons researchmap
Abstract
Methods to hook system calls issued by a guest operating system (OS) running on a virtual machine using a virtual machine monitor are proposed. The address of the hook point is derived from the guest OS’s source code and established prior to the kernel startup process. Due to changes in system call processing in OS updates and address space layout randomization, the addresses of these hook points cannot always be pre-determined before the kernel startup process. To address this challenge, a method for estimating the system call hook point is proposed in Linux by analyzing the guest OS memory on x86-64 CPUs rather than pre-calculation. Although the method supports Linux, the method can be extended to support other OS types. In this paper, we propose a method to extend the method to support additional OSes. Specifically, we present analysis results and a novel method for estimating hook points on FreeBSD, NetBSD, and OpenBSD. The effectiveness of our proposed method is also demonstrated through evaluation.
Keywords
system call
virtual machine monitor
operating system
Note
© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
This fulltext file will be available in Feb. 2026.
Published Date
2023-11-27
Publication Title
2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher
IEEE
Start Page
267
End Page
273
ISSN
2832-1324
Content Type
Conference Paper
language
English
OAI-PMH Set
岡山大学
Copyright Holders
© 2023 IEEE.
File Version
author
DOI
Related Url
isVersionOf https://doi.org/10.1109/candarw60564.2023.00051
Citation
M. Sato, T. Omori, T. Yamauchi and H. Taniguchi, "Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine Monitor," 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW), Matsue, Japan, 2023, pp. 267-273, doi: 10.1109/CANDARW60564.2023.00051.
助成情報
22H03592: 機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )