Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for triggering virtual machine introspection

A technology of virtual machine and trigger unit, applied in computer security devices, program control devices, software simulation/interpretation/simulation, etc., can solve problems such as system availability decline, leakage of confidential data, increase system extra load, etc., to avoid performance loss effect with security concerns

Active Publication Date: 2018-10-30
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the regular check scheme must be a trade-off between performance and security
If the check interval is set too long, it may cause some attacks that could have been successfully detected to be missed, or detected after the attack is successful, which may lead to irreparable losses, such as leakage of confidential data; if the check interval If the setting is too short, it may greatly increase the additional load of the system, thus affecting the normal execution and resulting in a decrease in the availability of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for triggering virtual machine introspection
  • Method, device and system for triggering virtual machine introspection
  • Method, device and system for triggering virtual machine introspection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] Hardware Transactional Memory (HTM) has the feature of jumping the program to the memory access conflict handler in the case of a multi-core memory access conflict. The specific execution process is as follows:

[0057]

[0058]In the above process, execute a transaction (Transaction) through the xbegin instruction. During the execution of the transaction, all memory addresses read are recorded by the hardware into the read set (Read S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device and system for triggering self-examination of a virtual machine, so as to provide a timely and effective safety check trigger mechanism. In the present invention, the data to be protected is determined; the data to be protected is monitored; when it is detected that the data to be protected is modified, the virtual machine self-examination is triggered. The invention avoids the performance loss and safety problems caused by starting the self-examination system of the virtual machine at regular intervals to perform the safety inspection, and has stronger applicability.

Description

technical field [0001] The present invention relates to the technical field of virtual machines, in particular to a method, device and system for triggering virtual machine introspection. Background technique [0002] In recent years, with the popularization of personal computers, mobile computing devices, and cloud computing, computer security has become a hot spot that people pay more and more attention to. People save a lot of critical data on various devices, including emails, private photos, bank account numbers and passwords, social network accounts, etc., which makes the device itself a target for hackers. How to improve computer security has become a key problem to be solved urgently. [0003] VMI (Virtual Machine Introspection, virtual machine introspection) is a method applied in a virtualization environment, using a VMM (Virtual Machine Monitor, virtual machine monitor) to enhance the security of a virtual machine from outside the virtual machine. This technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/455G06F11/28
CPCG06F21/53G06F21/54G06F21/554G06F21/568G06F9/45558G06F2221/03G06F2009/45587
Inventor 涂彬陈海波夏虞斌
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products