Virtualization based power and function isolating method for loading module of monolithic kernel operation system

An operating system and core module technology, applied in the field of computer security, can solve the problems of large losses, dilemmas, and low monitoring accuracy of the client system, and achieve the effect of avoiding frequent intervention, avoiding page table switching, and improving overall performance.

Active Publication Date: 2014-09-10
HUAWEI TEHCHNOLOGIES CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are two main problems in this method: 1) Monitoring granularity: how to determine the monitoring granularity is a dilemma. The larger the monitoring granularity, the smaller the performance loss of the client system, but the accuracy of monitoring is not high. , the smaller the monitoring granularity, the greater the accuracy of monitoring, but the greater the loss to the customer system; 2) subject marking: in the process of monitoring, it is first necessary to mark each execution subject (object) in the customer system, but Since both the macro kernel and the load module run at the kernel state privilege level and are located in the same memory address space, it is difficult for the virtual machine monitor monitoring the kernel to specifically identify whether the current execution subject is the kernel or the load module

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtualization based power and function isolating method for loading module of monolithic kernel operation system
  • Virtualization based power and function isolating method for loading module of monolithic kernel operation system
  • Virtualization based power and function isolating method for loading module of monolithic kernel operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with the examples, but not as a limitation of the present invention.

[0024] According to the virtualization-based macrokernel operating system loading module power isolation method proposed by the present invention, the scenarios where the macrokernel is attacked include: 1) the attacker obtains superuser authority, and then loads malicious programs into the kernel space of the operating system; 2) Attackers use existing system vulnerabilities to load malicious software such as Rootkit; 3) Careless users load unauthenticated load modules containing malicious codes, etc.

[0025] In the macrokernel operating system, the load module is in the same address space as the kernel during operation, and can see all memory views of each other. The virtualization-based macrokernel operating system loading module power isolation method proposed by the present invention, compared with the attached figure 1 , to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtualization based power and function isolating method for a loading module of a monolithic kernel operation system. The virtualization based power and function isolating method includes steps that a page table for the loading module and a page table for a monolithic kernel are generated in a kernel space of a virtual memory when the system is initialized; the operation system falling into a monitor of a virtual machine sets attributes of the two page tables and returns in the process of loading the loading module; when the loading module applies for a dynamic memory, the operation system falling into the monitor of the virtual machine updates the two page tables and returns; when the loading module directly calls and skips to code pages of the kernel module or directly rectifies data pages of the kernel module, the operation system falling into the monitor of the virtual machine switches the page tables and returns after checking and processing the page tables. By the aid of the monitoring mechanism of the monitor of the virtual machine, an executive body of the system is marked by page directory address register, and power and function of the kernel are isolated. Frequent interference during switching of a kernel mode and a user mode is avoided, and integral performance of system is improved.

Description

technical field [0001] The invention relates to an operating system capability isolation method, in particular to a virtualization-based macrokernel operating system loading module capability isolation method, which belongs to the technical field of computer security. Background technique [0002] The macrokernel operating system provides support for loading modules (including third-party modules and driver modules), and allows the loading modules to run at the kernel mode privilege level. Because it runs at the highest privilege level, the access of the loaded module to the key objects of the core services of the kernel is difficult to be effectively controlled by the system, and malicious third-party modules or infected driver modules can easily destroy the system call table and page table. , interrupt descriptor tables, system registers, and network ports and other system-critical objects, thus undermining the integrity of the entire system. [0003] With the development...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53
CPCG06F21/53
Inventor 钱振江刘永俊汤力姚宇峰张雪伍
Owner HUAWEI TEHCHNOLOGIES CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products