[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-japanese] FYI: FSIJ 9月例会



éåïçççããã
XenãéäããããããããMLãããçãããããã

çççãNguyen Anh Quynh ãããFSIJãïæääã eKimono ããããèãããã
ããããååçéãåèããã
  http://www.fsij.org/monthly-meetings/2009/Sep
------------------------------------------------------------------
ããã: eKimono: A Malware Scanner for Virtual Machines
éåææ 2009å9æ28æ(æææï 18:30 ã 20:30
åæ: æäéåäçååçç1-18-13 çèåãããã 1101 
    : ççèææäçææèçåççæ çèåäææ 
      11é äèåå: åäèå1 
Nguyen Anh Quynh ããã eKimono ãèãäãããã eKimonoã Virtual
Machineãåããåããããããããããããã

èè Nguyen Anh Quynh (AIST) 

Abstract
This talk presents eKimono, a new malware scanner for Virtual Machine
(VM). By putting eKimono outside of the protected VM, we can fix, or
raise the bar in other cases, the most significant flaws in the legacy
anti-malware solutions. Advantages offered by our scanner include, but
not limited to, the followings: firstly, eKimono is tamper-resistant
against malware inside VM, even if the malware compromises the VMâs
kernel. Secondly, it is harder to be fooled, because eKimono does not
rely on the services provided by VM. Last, but not least, our scanner
is invisible from VM, so that malware inside never know that they are
being monitored.

The architecture and implementation of eKimono will be discussed in
length. We will show how our scanner easily supports hypervisors like
Xen, KVM and QEMU out-of-the-box. The talk will also demonstrate that
it is trivial to support other types of VM, such as VMWare, thanks to
its extremely flexible design.

Technically, eKimono is a top component of a multiple framework
architecture. The talk analyses all the layers and explains how we
solve challenges in designing and implementing eKimono. The extended
application of the below layers is also examined to prove that our
frameworks are not just useful for eKimono, but can also be the base
to create many new tools, such as such as live memory forensic and VM
administration, for VM.

To conclude, this presentation entertains the audience with some live
demo on detecting several popular kernel and user-space root-kits in
Windows VM.
---------------------------------------------------------------------

Quynhãããäèããããããããããããããããçèãããããã

SysCan'09 Singapore 2-3/Jul (Singapore)
  Outspect: Live Memory Forensic and Incident Response for Virtual Machine
  http://www.syscan.org/Sg/singaporeconference.html

Xcon 2009 18-19/Aug (China)
   Detecting rootkits inside Virtual Machine
   http://xcon.xfocus.org/speakers.html

FrHack 2009 7-8/Sep (France)
  Memory forensic and incident response for live virtual machine (VM)
  http://www.frhack.org/frhack-conference.php#virtual-machine-memory-forensic

HITBSecConf 2009 06-09/Oct (Malaysia)
  eKimono: A Malware Scanner for Virtual Machines
  http://conference.hackinthebox.org/hitbsecconf2009kl/

DeepSec 2009 17-20/Nov (Austria)
  eKimono: detecting rootkits inside Virtual Machine
  https://deepsec.net/schedule/

------
suzaki
_______________________________________________
Xen-japanese mailing list
Xen-japanese@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/mailman/listinfo/xen-japanese

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.