Skip to feedback

Award Abstract # 1453011
CAREER: A Dual-VM Binary Code Reuse Based Framework for Automated Virtual Machine Introspection

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF TEXAS AT DALLAS
Initial Amendment Date: May 11, 2015
Latest Amendment Date: August 22, 2017
Award Number: 1453011
Award Instrument: Continuing Grant
Program Manager: Sol Greenspan
sgreensp@nsf.gov
 (703)292-7841
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2015
End Date: May 31, 2018 (Estimated)
Total Intended Award Amount: $535,054.00
Total Awarded Amount to Date: $327,172.00
Funds Obligated to Date: FY 2015 = $55,084.00
FY 2016 = $0.00

FY 2017 = $0.00
History of Investigator:
  • Zhiqiang Lin (Principal Investigator)
    zlin@cse.ohio-state.edu
Recipient Sponsored Research Office: University of Texas at Dallas
800 WEST CAMPBELL RD.
RICHARDSON
TX  US  75080-3021
(972)883-2313
Sponsor Congressional District: 24
Primary Place of Performance: University of Texas at Dallas
800 W Campbell RD
Richardson
TX  US  75080-3021
Primary Place of Performance
Congressional District:
24
Unique Entity Identifier (UEI): EJCVPNN1WFS5
Parent UEI:
NSF Program(s): Special Projects - CNS,
Secure &Trustworthy Cyberspace
Primary Program Source: 01001516DB NSF RESEARCH & RELATED ACTIVIT
01001617DB NSF RESEARCH & RELATED ACTIVIT

01001718DB NSF RESEARCH & RELATED ACTIVIT

01001819DB NSF RESEARCH & RELATED ACTIVIT

01001920DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 1045, 7434, 9178, 9251
Program Element Code(s): 171400, 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Virtual Machine Monitors (VMMs) and hypervisors have become a foundational technology for system developers to achieve increased levels of security, reliability, and manageability for large-scale computing systems such as cloud computing. However, when developing software at the VMM layer, developers often need to interpret the very low level hardware layer state and reconstruct the semantic meanings of the guest operating system events due to the lack of operating system level abstractions. This semantic gap problem has been a road block for a decade for many VMM level applications such as virtual machine introspection (VMI), malware analysis, and virtual machine management.

This research seeks to design and develop new approaches, practical techniques, and efficient implementations to automatically bridge the semantic gap for VMM layer programs including VMI. In particular, a dual-VM, binary code reuse based framework is formulated and applied to automatically bridge the semantic gap. Such a framework directly enables a large set of legacy utility software to automatically become VMI software. Meanwhile, the research includes developing a set of practical enabling techniques such as memory exclusive kernel version inference, and integrates these techniques with efficient implementations from binary rewriting. The results of this research are to significantly increase the productivity of virtualization software development as well as the security of virtualization software, and also open new opportunities for automated system administration, intrusion detection, and incident response.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Chaoshun Zuo, and Zhiqiang Lin "Exposing Server URLs of Mobile Apps With Selective Symbolic Execution" Proceedings of the 26th World Wide Web Conference , 2017 https://doi.org/10.1145/3038912.3052609
Erick Bauman and Gbadebo Ayoade and Zhiqiang Lin "A Survey on Hypervisor Based Monitoring: Approaches, Applications, and Evolutions" ACM Computing Surveys , v.48 , 2015 , p.10:1--10: 0360-0300
Junyuan Zeng and Zhiqiang Lin "Towards Automatic Inference of Kernel Object Semantics from Binary Code" Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID'15). Kyoto, Japan. , 2015
Junyuan Zeng, Yangchun Fu, and Zhiqiang Lin "Automatic Uncovering of Tap Points From Kernel Executions" Proceedings of The 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID'16). Paris, France. , 2016
Yangchun Fu and Zhiqiang Lin and David Brumley "Automatically Deriving Pointer Reference Expressions From Executions For Memory Dump Analysis" Proceedings of the 2015 ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE'15). Bergamo, Italy , 2015
Yufei Gu and Zhiqiang Lin "Derandomizing Kernel Address Space Layout for Introspection and Forensics" Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. New Orleans, LA. , 2016
Yufei Gu, Qingchuan Zhao, Yinqian Zhang, and Zhiqiang Lin "PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace" Proceedings of the 7th ACM Conference on Data and Application Security and Privacy , 2017 http://doi.acm.org/10.1145/3029806.3029830

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page