Unlock instant, AI-driven research and patent intelligence for your innovation.

A virtual machine memory isolation detection method based on physical page address analysis

A physical page address and memory isolation technology, applied in the field of virtual machine security, can solve the problems that memory isolation cannot provide clear and definite evidence, is not rigorous enough, and is not scientific enough

Active Publication Date: 2021-11-12
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF19 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two methods are obviously not rigorous enough and not scientific enough, and cannot provide clear and definite evidence on whether to realize memory isolation between virtual machines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtual machine memory isolation detection method based on physical page address analysis
  • A virtual machine memory isolation detection method based on physical page address analysis
  • A virtual machine memory isolation detection method based on physical page address analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0036] Any feature disclosed in this specification, unless specifically stated, can be replaced by other alternative features that are equivalent or have similar purposes. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0037] In the qemu-kvm virtualization environment, a virtual machine VM is equivalent to a qemu process on the host operating system. According to this point, "virtual machine memory isolation detection" is equivalent to "corresponding host process memory isolation detection" . Process memory isolation means that there is no crossover or duplication of real physical memory corresponding to different processes. However, due to the use of technologies such as inter-process shared memory or KSM (Kernel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual machine memory isolation detection method based on physical page address analysis, comprising the following steps: obtaining a virtual machine physical page base address set; obtaining virtual machine physical page read and write permissions; and comparing virtual machine physical memory information. Aiming at the problem that the memory isolation detection method of virtualization products is blank at present, the present invention proposes a virtual machine memory isolation detection method, which can provide technical support for safety testing and safety review of memory isolation of virtualization products.

Description

technical field [0001] The invention relates to the technical field of virtual machine security, in particular to a virtual machine memory isolation detection method based on physical page address analysis. Background technique [0002] Cloud computing is a new Internet business and technology that provides elastic and on-demand services to internal and external users through the Internet through pooled cluster computing capabilities. [0003] Virtualization technology is an important basic technology of cloud computing. Through the virtual machine management program VMM (Virtual Machine Monitor) or called Hypervisor (system management program), all hardware devices on the host computer are accessed. When the host machine starts and mobilizes the Hypervisor, it will load the operating systems on all virtual machines, and at the same time allocate an appropriate amount of physical resources such as network CPU, disk, and memory to each virtual machine. The VMM or Hypervisor ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/53G06F9/455
CPCG06F9/45558G06F21/53G06F2009/45583G06F2009/45587
Inventor 张玲马晓旭饶志宏牛长喜王伟金鑫
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD