作者: Erick Bauman , Gbadebo Ayoade , Zhiqiang Lin
DOI: 10.1145/2775111
关键词: Malware 、 Virtual machine 、 Software engineering 、 Computer security 、 Hypervisor 、 Computer science 、 Automation 、 Semantic gap 、 Tracing 、 Bridging (networking) 、 Virtualization
摘要: When designing computer monitoring systems, one goal has always been to have a complete view of the monitored target and at same time stealthily protect monitor itself. One way achieve this is use hypervisor-based, or more generally out virtual machine (VM)-based, monitoring. There are, however, challenges that limit mechanism; most significant these semantic gap problem. Over past decade, considerable amount research carried bridge develop all kinds out-of-VM techniques applications. By tracing evolution security solutions, article examines classifies different approaches proposed overcome gap—the fundamental challenge in hypervisor-based monitoring—and how they used various In particular, we review address constraints, such as practicality, flexibility, coverage, automation, while bridging gap; developed systems; systems applied deployed. addition systematizing techniques, also discuss remaining problems shed light on future directions