Hits:
Indexed by:会议论文
Date of Publication:2012-08-20
Included Journals:EI、CPCI-S、Scopus
Page Number:479-484
Key Words:Return-oriented programming; hypervisor; privilege escalation; security
Abstract:In this paper, we present an approach to attack on the Xen hypervisor utilizing return-oriented programming (ROP). It modifies the data in the hypervisor that controls whether a VM is privileged or not and thus can escalate the privilege of an unprivileged domain (domU) at run time. As ROP technique makes use of existed code to implement attack, not modifying or injecting any code, it can bypass the integrity protections that base on code measurement. By constructing such kind of attack at the virtualization layer, it can motivate further research work towards preventing or detecting ROP attack on the hypervisor.