Method, device and system for triggering self-examination of virtual machine

A technology of virtual machine and trigger unit, applied in computer security devices, program control devices, software simulation/interpretation/simulation, etc., can solve problems such as system availability decline, increase system extra load, confidential data leakage, etc., to avoid performance loss effect with security concerns

Active Publication Date: 2015-07-01
HUAWEI TECH CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the regular check scheme must be a trade-off between performance and security
If the check interval is set too long, it may cause some attacks that could have been successfully detected to be missed, or detected after the attack is successful, which may lead to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for triggering self-examination of virtual machine
  • Method, device and system for triggering self-examination of virtual machine
  • Method, device and system for triggering self-examination of virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] Hardware Transactional Memory (HTM) has the feature of jumping the program to the memory access conflict handler in the case of a multi-core memory access conflict. The specific execution process is as follows:

[0057]

[0058]In the above process, execute a transaction (Transaction) through the xbegin instruction. During the execution of the transaction, all memory addresses read are recorded by the hardware into the read set (Read S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method, an apparatus, and a system for triggering virtual machine introspection, so as to provide a timely and effective security check triggering mechanism. In the present invention, data that needs to be protected is determined; the data that needs to be protected is monitored; and when it is determineed that the data that needs to be protected is modified, virtual machine introspection is triggered. The present invention avoids a performance loss and a security problem that are brought about by regularly starting a virtual machine introspection system to perform a security check, and therefore, the present invention is more applicable.

Description

technical field [0001] The present invention relates to the technical field of virtual machines, in particular to a method, device and system for triggering virtual machine introspection. Background technique [0002] In recent years, with the popularization of personal computers, mobile computing devices, and cloud computing, computer security has become a hot spot that people pay more and more attention to. People save a lot of critical data on various devices, including emails, private photos, bank account numbers and passwords, social network accounts, etc., which makes the device itself a target for hackers. How to improve computer security has become a key problem to be solved urgently. [0003] VMI (Virtual Machine Introspection, virtual machine introspection) is a method applied in a virtualization environment, using a VMM (Virtual Machine Monitor, virtual machine monitor) to enhance the security of a virtual machine from outside the virtual machine. This technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/455G06F11/28
CPCG06F21/568G06F9/45558G06F2009/45587G06F21/54G06F21/53G06F2221/03G06F21/554
Inventor 涂彬陈海波夏虞斌
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products