This is my roadmap/research/notes for my final article of my engineering bachelor’s degree
- They are drafts, messy, unfinished, incomplete or experiments.
- Thoughts here will have tons of context omitted, which can make it hard to see the full picture or what I believe without being in my mind.
The original (english) title is:
“WHO WATCHES THE WATCHMEN? VIRTUAL MACHINE INTROSPECTION FOR RTOS AND GPOS ON ARM PROCESSORS”
The article was written in Portuguese:
There are a complete tutorial on github, explaining how to launch everything using docker:
https://github.com/Sargastico/K3t4m1n3
MY PRE-WORK BRRR T-T
CONTENT:
FINAL BRAIN CELL OUTPUT:
CSA (Used by RT-XEN and XVISOR)
STUDY CASES:
Real-Time Virtualization with Xvisor
Xen on ARM System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones
Real-Time Scheduling for Xen-ARM Virtual Machines
Minimizing I-O Latency in Xen-ARM
Realizing Compositional Scheduling through Virtualization
RT-Xen: towards real-time hypervisor scheduling in xen
Real-time Operating SystemVirtualization for Xen-Arm
Hiding in the Shadows Empowering ARM for Stealthy Virtual Machine Introspection
TODO Manipulating The ARM Hypervisor and TrustZOn
TODO Understanding the Security of ARM DebuggingFeatures
TODO Introspection for ARM TrustZone
CacheKit Evading Memory Introspection Using Cache Incoherence
“SHADOW WALKER” - Raising The Bar For Rootkit Raising The Bar For Rootkit Detection
RANDOM DROPS:
Risc-V Hypervisorr????
http://www.virtualopensystems.com/en/products/vosysmonitorv-risc-v/
XEN supports stealthy monitoring by default with altp2m
https://github.com/tklengyel/drakvuf/wiki/Xen-altp2m#stealthy-monitoring-with-xen-altp2m