首页
社区
课程
招聘
[转帖]Page Fault Injection in Virtual Machines: Accessing Swapped-Out Pages from HVMI
发表于: 2020-12-15 19:16 1766

[转帖]Page Fault Injection in Virtual Machines: Accessing Swapped-Out Pages from HVMI

2020-12-15 19:16
1766

Page Fault Injection in Virtual Machines: Accessing Swapped-Out Pages from HVMI

Dec 14, 2020 • Andrei Lutas

Introduction

Hypervisor Memory Introspection, as its name implies, relies heavily an analyzing guest memory contents in order to infer details about the OS structures or to analyze the behavior of the kernel and applications. This works perfectly as long as only physical memory or resident virtual memory is analyzed (for example, guest page-tables, or non-paged kernel memory). Many times, however, regions of the Windows kernel memory or regions belonging to user-mode processes will not be mapped in physical memory, thus preventing HVMI from analyzing their contents. In this blog post, we will describe how we deal with swapped-out guest memory, in order to ensure HVMI will get a chance to analyze the contents of a memory page even if it is not resident in physical memory: meet the page-fault injection mechanism!

3b1K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Z5N6X3#2A6i4K6u0W2k6$3W2@1K9s2g2T1i4K6u0W2K9h3!0Q4x3V1k6T1L8r3!0Y4i4K6u0r3x3U0l9J5x3q4)9J5c8U0p5J5i4K6u0r3x3e0c8Q4x3V1k6H3k6X3W2F1K9X3g2U0N6r3W2G2L8W2)9J5k6h3S2@1L8h3H3`.



[培训]传播安全知识、拓宽行业人脉——看雪讲师团队等你加入!

收藏
免费 2
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回