Nothing Special   »   [go: up one dir, main page]

CN104484606A - Verification method for memory information confidentiality of virtualization platform - Google Patents

Verification method for memory information confidentiality of virtualization platform Download PDF

Info

Publication number
CN104484606A
CN104484606A CN201410743465.6A CN201410743465A CN104484606A CN 104484606 A CN104484606 A CN 104484606A CN 201410743465 A CN201410743465 A CN 201410743465A CN 104484606 A CN104484606 A CN 104484606A
Authority
CN
China
Prior art keywords
virtual machine
memory
value
virtual
internal memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410743465.6A
Other languages
Chinese (zh)
Inventor
莫展鹏
杨松
季统凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
G Cloud Technology Co Ltd
Original Assignee
G Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by G Cloud Technology Co Ltd filed Critical G Cloud Technology Co Ltd
Priority to CN201410743465.6A priority Critical patent/CN104484606A/en
Publication of CN104484606A publication Critical patent/CN104484606A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of cloud computing, in particular to a verification method for memory information confidentiality of a virtualization platform. The verification method includes installing the virtualization platform on a host, and creating a virtual machine A with enough memory; logging in the virtual machine A, giving the same value to all available memory in the virtual machine A, checking residual memory, and reading values in the memory; deleting the virtual machine A, and creating a virtual machine with memory as large as the memory of the virtual machine A on the same host; logging in the virtual machine B, and reading and printing values in the memory; comparing the values printed in the virtual machine A with the values printed in the virtual machine B, determining that information are not removed completely and the memory information has defects in confidentiality if the values printed in the virtual machine B include continuous values as same as the values printed in the virtual machine A, and otherwise, determining that the memory information is perfect. The verification method can be used for verification of the memory information confidentiality of the virtualization platform.

Description

A kind of verification method of virtual platform memory information confidentiality
Technical field
The present invention relates to field of cloud computer technology, especially a kind of verification method of virtual platform memory information confidentiality.
Background technology
In cloud platform, because resource is all share to use and be carry out the distribution of resource and release as required, resource is distributed to a certain user and use today, and tomorrow may distribute to another one user.This characteristic embodies particularly evident in memory management, and the virtual machine a that certain block internal memory distributed to user A yesterday uses, and to today, user A no longer needs virtual machine a, and virtual machine a is deleted.Then user B creates virtual machine b today on same host.
In above-mentioned situation, user A can produce a kind of misgivings to safety: after virtual machine a is deleted, a part of remaining information may be remained, the virtual machine b at this time created on same host, whether may be assigned to the internal memory with virtual machine a same area, virtual platform whether have take corresponding means to guarantee the internal memory of virtual machine is released or reallocates is removed completely to before other virtual machines, thus ensure the privacy of the information of user A.
Summary of the invention
The technical matters that the present invention solves is the verification method providing a kind of virtual platform memory information confidentiality, for the data security checking of Intel Virtualization Technology and the type selecting of virtual platform provide support.
The technical scheme that the present invention solves the problems of the technologies described above is:
Specifically comprise the steps:
Step 1: install virtual platform on a host, the internal memory creating a virtual machine A, virtual machine A is enough large, as far as possible complete for possible Memory Allocation all on host;
Step 2: log in virtual machine A, all composes into an identical value the free memory in virtual machine A;
Step 3: the free memory checking virtual machine, reads the value in internal memory and prints checking and guarantee to write successfully;
Step 4: delete virtual machine A, same host creates the virtual machine B that internal memory and virtual machine A are equally large;
Step 5: log in virtual machine B, reads the value in internal memory and prints;
Step 6: the value of the internal memory printed in the value of the internal memory printed in contrast virtual machine B and virtual machine A, if it is identical with the value of giving in step 2 that the value of step 5 occurs continuous print, so prove that this virtual platform is when carrying out internal memory to discharge or redistribute, information is not removed completely, this virtual platform is existing defects in memory information confidentiality, otherwise, prove that the mechanism of this virtual platform in memory information confidentiality is perfect.
The virutal machine memory of described establishment refers to enough greatly and adopts exclusive mode to distribute virutal machine memory, but not the pattern that the virutal machine memory sizes such as Balloon pattern are variable, after virtual machine is created, operating system aspect display memory has used state, can not be taken by other processes;
Describedly complete for possible Memory Allocation all on host referring to be killed host running the process had nothing to do with virtual machine, and after creating virtual machine, operating system remains free memory and is down to the rank being less than 100,000,000 as far as possible.
Describedly free memory in virtual machine all composed into an identical value refer to application storage allocation, and internal memory is write as a value easily identified, as 0xFFFFFFFF represent whole be 1 value, or 0xAAAAAAAA is expressed as the value of 1010.
Described establishment internal memory and virtual machine A equally large virtual machine B refer to that establishment internal memory takes the virtual machine of host free memory, make the region of virtual machine B and virtual machine A storage allocation completely overlapping or close to completely overlapping.
The value printed in described virtual machine B occurs consecutive identical value and refers to the internal memory having occurred assignment in virtual machine A in virtual machine B, and the remaining information in these regions is not completely removed.
The beneficial effect of the present invention program is as follows:
1, method of the present invention can prove whether a virtual platform is credible in memory information registration property, and whether utilize large internal memory virutal machine memory to redistribute the feature that there is overlapping region, can view the internal memory redistributed is eliminated completely;
2, method of the present invention is a kind of general and method of neutrality, without the need to relying on the instrument of any particular virtual platform, only reads and writes from the internal memory angle of bottom, is neutral and believable.
Accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described:
Accompanying drawing 1 is process flow diagram of the present invention;
Embodiment
See that shown in accompanying drawing 1, embodiments of the present invention have multiple, to carry out memory read-write for C beforehand research under CentOS virtual machine, wherein a kind of implementation method is described here, as shown in Figure 1, specific implementation process is as follows for process flow diagram:
1, the free memory that a virtual machine A takes host is created
2, log in virtual machine A, carry out following operation
Virutal machine memory assignment program is as follows: this program of # the internal memory of 12G all assignment be 0xFFFFFFFF
Be programmed to executable program and perform
Internal memory service condition can be seen
Close virtual machine A.
3, a virtual machine B is created equally large with virtual machine A internal memory
4, log in virtual machine B, carry out following operation
The following # of virutal machine memory written-out program outputs to standard output internal memory
5, the result of twice is compared
It is all 0 that virtual machine B reads, and virtual machine A write is all 0xFFFFFFFF, and the memory information namely in verifying virtual machines A had all been eliminated before redistributing, and the mechanism of this virtual platform in memory information confidentiality is perfect.

Claims (5)

1. a verification method for virtual platform memory information confidentiality, is characterized in that: specifically comprise the steps:
Step 1: install virtual platform on a host, the internal memory creating a virtual machine A, virtual machine A is enough large, as far as possible complete for possible Memory Allocation all on host;
Step 2: log in virtual machine A, all composes into an identical value the free memory in virtual machine A;
Step 3: the free memory checking virtual machine, reads the value in internal memory and prints checking and guarantee to write successfully;
Step 4: delete virtual machine A, same host creates the virtual machine B that internal memory and virtual machine A are equally large;
Step 5: log in virtual machine B, reads the value in internal memory and prints;
Step 6: the value of the internal memory printed in the value of the internal memory printed in contrast virtual machine B and virtual machine A, if it is identical with the value of giving in step 2 that the value of step 5 occurs continuous print, so prove that this virtual platform is when carrying out internal memory to discharge or redistribute, information is not removed completely, this virtual platform is existing defects in memory information confidentiality, otherwise, prove that the mechanism of this virtual platform in memory information confidentiality is perfect.
2. the verification method of virtual platform memory information confidentiality according to claim 1, it is characterized in that: the virutal machine memory of described establishment refers to enough greatly and adopts exclusive mode to distribute virutal machine memory, but not the pattern that the virutal machine memory sizes such as Balloon pattern are variable, after virtual machine is created, operating system aspect display memory has used state, can not be taken by other processes;
Describedly complete for possible Memory Allocation all on host referring to be killed host running the process had nothing to do with virtual machine, and after creating virtual machine, operating system remains free memory and is down to the rank being less than 100,000,000 as far as possible.
3. the verification method of virtual platform memory information confidentiality according to claim 1, it is characterized in that: describedly free memory in virtual machine is all composed into an identical value refer to application storage allocation, and internal memory is write as a value easily identified, as 0xFFFFFFFF represent whole be 1 value, or 0xAAAAAAAA is expressed as the value of 1010.
4. the verification method of virtual platform memory information confidentiality according to claim 2, it is characterized in that: describedly free memory in virtual machine is all composed into an identical value refer to application storage allocation, and internal memory is write as a value easily identified, as 0xFFFFFFFF represent whole be 1 value, or 0xAAAAAAAA is expressed as the value of 1010.
5. the verification method of the virtual platform memory information confidentiality according to any one of Claims 1-4, it is characterized in that: described establishment internal memory and virtual machine A equally large virtual machine B refer to that establishment internal memory takes the virtual machine of host free memory, make the region of virtual machine B and virtual machine A storage allocation completely overlapping or close to completely overlapping.
CN201410743465.6A 2014-12-05 2014-12-05 Verification method for memory information confidentiality of virtualization platform Pending CN104484606A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410743465.6A CN104484606A (en) 2014-12-05 2014-12-05 Verification method for memory information confidentiality of virtualization platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410743465.6A CN104484606A (en) 2014-12-05 2014-12-05 Verification method for memory information confidentiality of virtualization platform

Publications (1)

Publication Number Publication Date
CN104484606A true CN104484606A (en) 2015-04-01

Family

ID=52759147

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410743465.6A Pending CN104484606A (en) 2014-12-05 2014-12-05 Verification method for memory information confidentiality of virtualization platform

Country Status (1)

Country Link
CN (1) CN104484606A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106919854A (en) * 2017-03-08 2017-07-04 公安部第三研究所 The detection method that a kind of virtual machine remaining information is removed
CN111399988A (en) * 2020-04-08 2020-07-10 公安部第三研究所 Memory security detection system and method of cloud platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1538300A (en) * 2003-09-23 2004-10-20 中兴通讯股份有限公司 Method of detecting and location of leakage of internal storage of real-time system localization
CN1896957A (en) * 2005-07-14 2007-01-17 中兴通讯股份有限公司 Method for leaking memory of positioning virtual operation system
US20070027942A1 (en) * 2005-07-27 2007-02-01 Trotter Martin J Memory leak detection
CN101814049A (en) * 2010-03-23 2010-08-25 北京大学 Memory leak detection method
CN104182320A (en) * 2013-05-23 2014-12-03 联想(北京)有限公司 Method and device for monitoring leakage of memory

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1538300A (en) * 2003-09-23 2004-10-20 中兴通讯股份有限公司 Method of detecting and location of leakage of internal storage of real-time system localization
CN1896957A (en) * 2005-07-14 2007-01-17 中兴通讯股份有限公司 Method for leaking memory of positioning virtual operation system
US20070027942A1 (en) * 2005-07-27 2007-02-01 Trotter Martin J Memory leak detection
CN101814049A (en) * 2010-03-23 2010-08-25 北京大学 Memory leak detection method
CN104182320A (en) * 2013-05-23 2014-12-03 联想(北京)有限公司 Method and device for monitoring leakage of memory

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩奕等: ""虚拟化内存泄漏的风险探知及研究"", 《保密科学技术》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106919854A (en) * 2017-03-08 2017-07-04 公安部第三研究所 The detection method that a kind of virtual machine remaining information is removed
CN106919854B (en) * 2017-03-08 2021-04-30 公安部第三研究所 Detection method for clearing residual information of virtual machine
CN111399988A (en) * 2020-04-08 2020-07-10 公安部第三研究所 Memory security detection system and method of cloud platform
CN111399988B (en) * 2020-04-08 2024-02-09 公安部第三研究所 Memory security detection system and method for cloud platform

Similar Documents

Publication Publication Date Title
US10599427B2 (en) Software updating
KR102257320B1 (en) Monitoring of memory page transitions between hypervisors and virtual machines
US9965270B2 (en) Updating computer firmware
US9053042B2 (en) Method, system, and device for modifying a secure enclave configuration without changing the enclave measurement
CN104503708B (en) The method and device of data hash storage
DE112017006699T5 (en) METHOD AND DEVICE FOR AREA-BASED TEST POINTS IN A MEMORY DEVICE
US10635642B1 (en) Multi-cloud bi-directional storage replication system and techniques
US11016805B2 (en) Programmatically applying labels to nodes in cluster orchestration platforms
US10241813B2 (en) Method and apparatus for patching
US10924277B2 (en) Certifying authenticity of stored code and code updates
CN103761159B (en) Method and system for processing incremental snapshot
KR102185150B1 (en) Generalized write operations verification method
EP3051408B1 (en) Data operating method and device
US8997249B1 (en) Software activation and revalidation
CN105550060B (en) A kind of backup method and device of increment upgrading
US20130212593A1 (en) Controlled Growth in Virtual Disks
US10318166B1 (en) Preserving locality of storage accesses by virtual machine copies in hyper-converged infrastructure appliances
CN108804913B (en) Application program running method and device
CN103279712A (en) Method for enhancing system safety, checking device and safety system
CN107533602B (en) Computing device and method thereof, and computing system
US8549223B1 (en) Systems and methods for reclaiming storage space on striped volumes
CN102096782B (en) Internet banking safety authentication method based on removable medium of virtual machine
EP2998903B1 (en) System and method for robust full-drive encryption
EP3262519A1 (en) Configuration of a memory controller for copy-on-write
CN104484606A (en) Verification method for memory information confidentiality of virtualization platform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150401