作者: George W. Dunlap , Samuel T. King , Sukru Cinar , Murtaza A. Basrai , Peter M. Chen
关键词: Intrusion 、 Operating system 、 Virtualization 、 Virtual machine 、 Overhead (business) 、 Dependency (UML) 、 Computer science 、 Embedded system 、 Logging 、 Hardware and Architecture
摘要: Current system loggers have two problems: they depend on the integrity of operating being logged, and do not save sufficient information to replay analyze attacks that include any non-deterministic events. ReVirt removes dependency target by moving it into a virtual machine logging below machine. This allows system's execution before, during, after an intruder compromises system, even if replaces system. logs enough long-term instruction-by-instruction. enables provide arbitrarily detailed observations about what transpired in presence executions. adds reasonable time space overhead. Overheads due virtualization are imperceptible for interactive use CPU-bound workloads, 13--58% kernel-intensive workloads. Logging 0--8% overhead, traffic our workloads can be stored single disk several months.