[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Howto protect windows driver in hypervisor


  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: 胡少龙 <sunofblack@xxxxxxxx>
  • Date: Tue, 12 Oct 2010 10:25:22 +0800 (CST)
  • Delivery-date: Mon, 11 Oct 2010 19:26:14 -0700
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.cn; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=bMsRaVmQ2/p0596fbAK6ms7OKXipvpUSkyv2HXpt7VbO+ecBvkQ4j0M/ZKtBzJq6lNHXoHivMpU3DqzP1mKqXLPvxaR5E5lu4WILlxMbrBml/pDPVFpgUvunP+s1ZO7RKcbNwxcVVw47iJT/h9Ew40oStEDuEh54S6pYYh7Iuto=;
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

Hi,

I want to protect a virtual driver, for exanmple an PV-on-HVM driver, i don't 
want a rootkit to sabtoge it, including code and especially I/O ring it use.

There are some research to protect memory in hypervisor, for instance, write 
protect, split SPT(which is can be used to protect user space process from 
kernel rootkit), but when it comes to kernel driver, is there a feasible 
solution or some information i can reference? Thanks.

Hu Shaolong





_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.