Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1924943.1924952acmotherconferencesArticle/Chapter ViewAbstractPublication PagesosdiConference Proceedingsconference-collections
Article

Accountable virtual machines

Published: 04 October 2010 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper, we introduce accountable virtual machines (AVMs). Like ordinary virtual machines, AVMs can execute binary software images in a virtualized copy of a computer system; in addition, they can record non-repudiable information that allows auditors to subsequently check whether the software behaved as intended. AVMs provide strong accountability, which is important, for instance, in distributed systems where different hosts and organizations do not necessarily trust each other, or where software is hosted on third-party operated platforms. AVMs can provide accountability for unmodified binary images and do not require trusted hardware. To demonstrate that AVMs are practical, we have designed and implemented a prototype AVM monitor based on VMware Workstation, and used it to detect several existing cheats in Counterstrike, a popular online multi-player game.

    References

    [1]
    AMX Mod X project. http://www.amxmodx.org/.
    [2]
    D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Accountable Internet protocol (AIP). In Proceedings of the ACM SIGCOMM Conference (SIGCOMM), Aug. 2008.
    [3]
    K. Aoki, J. Franke, A. K. Lenstra, E. Thomé, J. W. Bos, P. Gaudry, A. Kruppa, P. L. Montgomery, D. A. Osvik, H. te Riele, A. Timofeev, and P. Zimmerman. Factorization of a 768- bit RSA modulus. http://eprint.iacr.org/2010/ 006.pdf.
    [4]
    K. Argyraki, P. Maniatis, O. Irzak, and S. Shenker. An accountability interface for the Internet. In Proceedings of the IEEE International Conference on Network Protocols (ICNP), Oct. 2007.
    [5]
    A. Aviram, S.-C. Weng, S. Hu, and B. Ford. Efficient systemen-forced deterministic parallelism. In Proceedings of the USENIX Symposium on Operating System Design and Implementation (OSDI), Oct. 2010.
    [6]
    P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Oct. 2003.
    [7]
    N. E. Baughman, M. Liberatore, and B. N. Levine. Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Transactions on Networking (ToN), 15(1):1-13, Feb. 2007.
    [8]
    T. C. Bressoud and F. B. Schneider. Hypervisor-based fault tolerance. ACM Transactions on Computer Systems (TOCS), 14(1):80-107, 1996.
    [9]
    C. Chambers, W. Feng, W. Feng, and D. Saha. Mitigating information exposure to cheaters in real-time strategy games. In Proceedings of the ACM International Workshop on Network and operating systems support for digital audio and video (NOSSDAV), June 2005.
    [10]
    J. Chow, T. Garfinkel, and P. M. Chen. Decoupling dynamic program analysis from execution in virtual environments. In Proceedings of the USENIX Annual Technical Conference, June 2008.
    [11]
    B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson, and A. Warfield. Remus: High availability via asynchronous virtual machine replication. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2008.
    [12]
    J. Dabrowski and E. V. Munson. Is 100 milliseconds too fast? In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), Apr. 2001.
    [13]
    J. Devietti, B. Lucia, L. Ceze, and M. Oskin. DMP: Deterministic shared memory multiprocessing. In Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Mar. 2009.
    [14]
    R. Dingledine, M. J. Freedman, and D. Molnar. Peer-to-Peer: Harnessing the Power of Disruptive Technologies, chapter Accountability. O'Reilly and Associates, 2001.
    [15]
    G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the USENIX Symposium on Operating System Design and Implementation (OSDI), Dec. 2002.
    [16]
    G. W. Dunlap, D. Lucchetti, P. M. Chen, and M. Fetterman. Execution replay for multiprocessor virtual machines. In Proceedings of the ACM/USENIX International Conference on Virtual Execution Environments (VEE), Mar. 2008.
    [17]
    T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Oct. 2003.
    [18]
    A. Haeberlen. A case for the accountable cloud. In Proceedings of the ACM SIGOPS International Workshop on Large-Scale Distributed Systems and Middleware (LADIS), Oct. 2009.
    [19]
    A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. Accountable virtual machines. Technical Report 2010-3, Max Planck Institute for Software Systems, Sept. 2010.
    [20]
    A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel. NetReview: Detecting when interdomain routing goes wrong. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2009.
    [21]
    A. Haeberlen, P. Kuznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Oct. 2007.
    [22]
    A. Haeberlen, P. Kuznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. Technical Report 2007-3, Max Planck Institute for Software Systems, Oct. 2007.
    [23]
    G. Hoglund. 4.5 million copies of EULA-compliant spyware. http://www.rootkit.com/blog.php?newsid=358.
    [24]
    G. Hoglund and G. McGraw. Exploiting Online Games: Cheating Massively Distributed Systems. Addison-Wesley, 2007.
    [25]
    S. T. King, G.W. Dunlap, and P. M. Chen. Debugging operating systems with time-traveling virtual machines. In Proceedings of the USENIX Annual Technical Conference, Apr. 2005.
    [26]
    B. W. Lampson. Computer security in the real world. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Dec. 2000.
    [27]
    P. Laskowski and J. Chuang. Network monitors and contracting systems: competition and innovation. In Proceedings of the ACM SIGCOMM Conference (SIGCOMM), Sept. 2006.
    [28]
    D. Lee, M. Said, S. Narayanasamy, Z. Yang, and C. Pereira. Offline symbolic analysis for multi-processor execution replay. In Proceedings of the IEEE/ACM International Symposium on Microarchitecture (MICRO), Dec. 2009.
    [29]
    D. Lee, B. Wester, K. Veeraraghavan, S. Narayanasamy, P. M. Chen, and J. Flinn. Respec: Efficient online multiprocessor replay via speculation and external determinism. In Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Mar. 2010.
    [30]
    D. Levin, J. R. Douceur, J. R. Lorch, and T. Moscibroda. TrInc: Small trusted hardware for large distributed systems. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2009.
    [31]
    N. Michalakis, R. Soulé, and R. Grimm. Ensuring content integrity for untrusted peer-to-peer content distribution networks. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2007.
    [32]
    C. Mönch, G. Grimen, and R. Midtstraum. Protecting online games against cheating. In Proceedings of the Workshop on Network and Systems Support for Games (NetGames), Oct. 2006.
    [33]
    J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Annual Network and Distributed Systems Security Symposium (NDSS), Feb. 2005.
    [34]
    T. Okamoto. A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 36(1):47-53, 1990.
    [35]
    PunkBuster web site. http://www.evenbalance.com/.
    [36]
    A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Oct. 2005.
    [37]
    A. Smith. ASUS releases games cheat drivers. http://www.theregister.co.uk/2001/05/10/ asus_releases_games_cheat_drivers/, May 2001.
    [38]
    Valve Corporation. Valve anti-cheat system (VAC). https: //support.steampowered.com/kb_article.php? ref=7849-RADZ-6869.
    [39]
    M. Xu, V. Malyugin, J. Sheldon, G. Venkitachalam, and B. Weissman. ReTrace: Collecting execution trace with virtual machine deterministic replay. In Proceedings of the Annual Workshop on Modeling, Benchmarking, and Simulation (MoBS), June 2007.
    [40]
    C. Yan, D. Englender, M. Prvulovic, B. Rogers, and Y. Solihin. Improving cost, performance, and security of memory encryption and authentication. ACM SIGARCH Computer Architecture News, 34(2):179-190, 2006.
    [41]
    J. Yan and B. Randell. A systematic classification of cheating in online games. In Proceedings of the Workshop on Network and Systems Support for Games (NetGames), Oct. 2005.
    [42]
    S. Yang, A. R. Butt, Y. C. Hu, and S. P. Midkiff. Trust but verify: Monitoring remotely executing programs for progress and correctness. In Proceedings of the ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming (PPoPP), June 2005.
    [43]
    A. R. Yumerefendi and J. S. Chase. Trust but verify: Accountability for Internet services. In Proceedings of the ACM SIGOPS European Workshop, Sep 2004.
    [44]
    A. R. Yumerefendi and J. S. Chase. Strong accountability for network storage. ACM Transactions on Storage (TOS), 3(3):11, Oct. 2007.

    Cited By

    View all
    • (2024)Efficient Auditing of Event-driven Web ApplicationsProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3650089(1208-1224)Online publication date: 22-Apr-2024
    • (2023)Metaverse as a ServiceProceedings of the 2023 ACM Symposium on Cloud Computing10.1145/3620678.3624662(298-307)Online publication date: 30-Oct-2023
    • (2021)REBOUNDProceedings of the Sixteenth European Conference on Computer Systems10.1145/3447786.3456257(523-539)Online publication date: 21-Apr-2021
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    OSDI'10: Proceedings of the 9th USENIX conference on Operating systems design and implementation
    October 2010
    386 pages

    Sponsors

    • NSF: National Science Foundation
    • Google Inc.
    • Infosys
    • Microsoft Research: Microsoft Research
    • USENIX Assoc: USENIX Assoc

    In-Cooperation

    Publisher

    USENIX Association

    United States

    Publication History

    Published: 04 October 2010

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Efficient Auditing of Event-driven Web ApplicationsProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3650089(1208-1224)Online publication date: 22-Apr-2024
    • (2023)Metaverse as a ServiceProceedings of the 2023 ACM Symposium on Cloud Computing10.1145/3620678.3624662(298-307)Online publication date: 30-Oct-2023
    • (2021)REBOUNDProceedings of the Sixteenth European Conference on Computer Systems10.1145/3447786.3456257(523-539)Online publication date: 21-Apr-2021
    • (2020)COBRAProceedings of the 14th USENIX Conference on Operating Systems Design and Implementation10.5555/3488766.3488770(63-80)Online publication date: 4-Nov-2020
    • (2019)Execution integrity without implicit trust of system softwareProceedings of the 4th Workshop on System Software for Trusted Execution10.1145/3342559.3365337(1-6)Online publication date: 27-Oct-2019
    • (2018)Blockchain-based real-time cheat prevention and robustness for multi-player online gamesProceedings of the 14th International Conference on emerging Networking EXperiments and Technologies10.1145/3281411.3281438(178-190)Online publication date: 4-Dec-2018
    • (2017)Towards Reliable Application Deployment in the CloudProceedings of the 13th International Conference on emerging Networking EXperiments and Technologies10.1145/3143361.3143388(464-477)Online publication date: 28-Nov-2017
    • (2017)The Efficient Server Audit Problem, Deduplicated Re-execution, and the WebProceedings of the 26th Symposium on Operating Systems Principles10.1145/3132747.3132760(546-564)Online publication date: 14-Oct-2017
    • (2016)Bootstrapping and maintaining trust in the cloudProceedings of the 32nd Annual Conference on Computer Security Applications10.1145/2991079.2991104(65-77)Online publication date: 5-Dec-2016
    • (2016)A survey of accountability in computer networks and distributed systemsSecurity and Communication Networks10.1002/sec.5749:4(290-315)Online publication date: 10-Mar-2016
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media