location: Current position: Home >> Scientific Research >> Paper Publications

Return-Oriented Programming Attack on the Xen Hypervisor

Hits:

Indexed by:会议论文

Date of Publication:2012-08-20

Included Journals:EI、CPCI-S、Scopus

Page Number:479-484

Key Words:Return-oriented programming; hypervisor; privilege escalation; security

Abstract:In this paper, we present an approach to attack on the Xen hypervisor utilizing return-oriented programming (ROP). It modifies the data in the hypervisor that controls whether a VM is privileged or not and thus can escalate the privilege of an unprivileged domain (domU) at run time. As ROP technique makes use of existed code to implement attack, not modifying or injecting any code, it can bypass the integrity protections that base on code measurement. By constructing such kind of attack at the virtualization layer, it can motivate further research work towards preventing or detecting ROP attack on the hypervisor.

Pre One:Location Anonymity Based on Fake Queries in Continuous Location-based Services

Next One:A combined clustering scheme for protecting location privacy and query privacy in pervasive environments