Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/CIT.2012.119guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Libvmi: A Library for Bridging the Semantic Gap between Guest OS and VMM

Published: 27 October 2012 Publication History

Abstract

Semantic gap is one of the most important problems in the virtualized computer systems. Solving this problem not only helps to develop security and virtual machine monitoring applications, but also benefits for VMM resource management and VMM-based service implementation. In this paper, we first review the general architecture of virtual computer systems, especially the interaction principles between Guest OS and VMM so as to better understand the causes of semantic gap. Then we consider how to build a library that can integrate the commonalities existing in different VMMs and Guest OSes. It should be general enough to facilitate the above mentioned applications development. In order to more clearly illustrate this issue, we select Libvmi as the case study, elaborating its design philosophy and implementation. Finally, we describe how to use Libvmi with two application examples and verify its correctness and effectiveness.

Cited By

View all
  • (2023)Haskell Library for Safer Virtual Machine Introspection (Experience Report)Proceedings of the 16th ACM SIGPLAN International Haskell Symposium10.1145/3609026.3609732(89-96)Online publication date: 30-Aug-2023
  • (2022)Advanced malware and their impact on virtualization: A case study on hybrid feature extraction using deep memory introspectionProceedings of the 2022 Fourteenth International Conference on Contemporary Computing10.1145/3549206.3549223(74-80)Online publication date: 4-Aug-2022
  • (2022)In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory ForensicsACM Transactions on Privacy and Security10.1145/352810225:4(1-32)Online publication date: 9-Jul-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CIT '12: Proceedings of the 2012 IEEE 12th International Conference on Computer and Information Technology
October 2012
1143 pages
ISBN:9780769548586

Publisher

IEEE Computer Society

United States

Publication History

Published: 27 October 2012

Author Tags

  1. Guest OS
  2. KVM
  3. Libvmi
  4. Semantic Gap
  5. VMM
  6. Virtualization
  7. Xen

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Haskell Library for Safer Virtual Machine Introspection (Experience Report)Proceedings of the 16th ACM SIGPLAN International Haskell Symposium10.1145/3609026.3609732(89-96)Online publication date: 30-Aug-2023
  • (2022)Advanced malware and their impact on virtualization: A case study on hybrid feature extraction using deep memory introspectionProceedings of the 2022 Fourteenth International Conference on Contemporary Computing10.1145/3549206.3549223(74-80)Online publication date: 4-Aug-2022
  • (2022)In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory ForensicsACM Transactions on Privacy and Security10.1145/352810225:4(1-32)Online publication date: 9-Jul-2022
  • (2022)An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M DevicesProceedings of the 8th ACM on Cyber-Physical System Security Workshop10.1145/3494107.3522774(85-94)Online publication date: 30-May-2022
  • (2018)Virtual Machine Introspection based Cloud Monitoring PlatformProceedings of the 19th International Conference on Computer Systems and Technologies10.1145/3274005.3274030(104-109)Online publication date: 13-Sep-2018
  • (2017)Intrusion detection techniques in cloud environmentJournal of Network and Computer Applications10.1016/j.jnca.2016.10.01577:C(18-47)Online publication date: 1-Jan-2017
  • (2016)Optimizing guest swapping using elastic and transparent memory provisioning on virtualization platformFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-5217-z10:5(908-924)Online publication date: 1-Oct-2016
  • (2015)A Model of Dynamic Malware Analysis Based on VMIProceedings of the ICA3PP International Workshops and Symposiums on Algorithms and Architectures for Parallel Processing - Volume 953210.1007/978-3-319-27161-3_42(465-475)Online publication date: 18-Nov-2015

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media