hInjector

hInjector
hInjector is a tool for injecting hypercall attacks in virtualized environments for the purpose of evaluating hypercall security mechanisms - intrusion detection systems and mandatory access control mechanisms. hInjector injects hypercall attacks during regular operation of guest virtual machines, crafted with respect to representative attack models. The current implementation of hInjector is for the Xen hypervisor, which can be ported to other open-source hypervisors, such as KVM.
For more information, please contact Aleksandar Milenkoski.
Links:
Mailing List
Publications
2019
-
Towards Testing the Performance Influence of Hypervisor Hypercall Interface Behavior. L. Beierlieb; L. Iffländer; S. Kounev; A. Milenkoski; in Proceedings of the 10th Symposium on Software Performance 2019 (SSP’19) (2019).
-
Towards Testing the Software Aging Behavior of Hypervisor Hypercall Interfaces. L. Beierlieb; L. Iffländer; A. Milenkoski; C. F. Goncalves; N. Antunes; S. Kounev; in 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) (2019).
2015
-
Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection. A. Milenkoski; B. D. Payne; N. Antunes; M. Vieira; S. Kounev; A. Avritzer; M. Luft; in The 18th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2015) (2015).
2014
-
Technical Information on Vulnerabilities of Hypercall Handlers A. Milenkoski; M. Vieira; B. D. Payne; N. Antunes; S. Kounev; (2014).
-
Experience Report: An Analysis of Hypercall Handler Vulnerabilities. A. Milenkoski; B. D. Payne; N. Antunes; M. Vieira; S. Kounev; in Proceedings of The 25th IEEE International Symposium on Software Reliability Engineering (ISSRE 2014) --- Research Track (2014).
2013
2012