Method for detecting existence of virtual machine monitor (VMM) under Windows platform

A virtual machine monitor and platform technology, which is applied in the direction of platform integrity maintenance, instruments, computer security devices, etc., can solve the problems of no detection of VMM technical solutions, and the inability to distinguish the current operating system operating environment, so as to avoid malicious tampering and apply Effect of increased range, reliability and accuracy

Active Publication Date: 2012-08-22
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this detection method has limitations: for the case where the VMM runs directly on the hardware environment, the VMM does not relocate the IDTR to a new address, so it cannot distinguish the operating environment of the current operating system
Based on this resource sharing framework, the characteristics of VMM can be found from these resource differences as a method for detecting the existence of VMM, but there is no public report on the technical solution for detecting the existence of VMM through resource differences such as page table buffer registers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting existence of virtual machine monitor (VMM) under Windows platform
  • Method for detecting existence of virtual machine monitor (VMM) under Windows platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] figure 1 Is the general flowchart of the present invention.

[0033] Step 1), allocate memory space to the page table Allocated PTEs of size N and another page table entry Special PTE;

[0034] Step 2), write address A for Allocated PTEs, and write address B for Special PTEs;

[0035] Step 3), sequentially read the content of Allocated PTEs with a size of N, so that all page table entries pointing to address A are stored in the page table buffer register;

[0036] Step 4), without changing the content of the page table buffer, change the content of the Allocated PTEs pointer to the address B pointed to by the Special PTE in turn;

[0037] Step 5), execute a privileged instruction RDMSR;

[0038] Step 6), set a counter, the initial value is N, set the pointer i, and make the pointer point to the starting address of the page table buffer register;

[0039] Step 7), if the pointer i has traversed all the page table entries in the page table buffer register, then execut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for detecting the existence of a virtual machine monitor (VMM) under a Windows platform, aiming at solving the problem that malicious codes use the VMM as a platform for hiding self behaviors and providing malicious services, and providing a method for detecting the existence of the VMM through resource differences. In a technical scheme, the method comprises the steps of: firstly, allocating internal memory spaces for Allocated PTEs (Page Table Entries) and a Special PTE; writing an address A before mapping modification for the Allocated PTEs; writing an address B after mapping modification for the Special PTE; accessing the Allocated PTEs in sequence to ensure that all PTEs pointing to the address A are stored into a page table buffer register; sequentially modifying the pointer contents of the Allocated PTEs into the address B pointed by the Special PTE; executing a privileged instruction RDMSR (Read from Model Specific Register) in a Windows system; and setting a counter, traversing all page table entries in the page table buffer register, and judging whether the VMM exists in the current system by judging whether the numerical value of the counter is consistent with N. The method disclosed by the invention can be used for effectively detecting the VMM so as to improve system security.

Description

technical field [0001] The invention relates to a method for detecting the existence of a virtual machine monitor (VMM), in particular to a method for detecting the existence of a virtual machine monitor through differences in page table buffer registers. Background technique [0002] In hardware virtualization technology, a virtual machine monitor (Virtual Machine Monitor, VMM) is software that can create an efficient, isolated copy of a computer system. Since the VMM has higher authority than the guest operating system (Guest OS), more and more malicious codes use the VMM as a platform to hide their behavior and provide malicious services. The detection technology for this kind of malicious code is mainly to detect the existence characteristics of VMM (Virtual Machine Monitor). Only when the existence of VMM is detected can it be used as one of the important basis for detecting the existence of this new type of malicious code. Traditional methods for detecting VMM current...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F9/455G06F21/50G06F21/53
Inventor 宁剑刘波陈林肖枫涛王天佐陈新张静马晓龙彭磊
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products