@inbook{146bd075bb3341e0a4bc500332b8e4dd,
title = "Hiding File Manipulation of Essential Services by System Call Proxy",
abstract = "Security software or logging programs are frequently attacked because they are an obstruction to attackers. Protecting these essential services from attack is crucial to preventing and mitigating damage. Hiding information related to essential services, such as that of the files and processes, can help to deter attacks on these services. This paper proposes a method of hiding file manipulation for essential services. The method makes the files invisible to all services except their corresponding essential services and provides access methods to those files in a virtual machine (VM) environment. In the proposed method, system calls to those files are executed by a proxy process on the other VM. The original system call is not executed in the operating system of the original VM, however, the result of file access is returned to the original process. Thus, the files of essential services are placed on the other VM and other processes on the original VM cannot access to them. Therefore, the proposed method can prevent or deter identification of essential services based on file information monitoring.",
keywords = "File access, Security, Virtual machine",
author = "Masaya Sato and Hideo Taniguchi and Toshihiro Yamauchi",
note = "Publisher Copyright: {\textcopyright} 2019, Springer Nature Switzerland AG. Copyright: Copyright 2021 Elsevier B.V., All rights reserved.",
year = "2019",
doi = "10.1007/978-3-319-98530-5_76",
language = "English",
series = "Lecture Notes on Data Engineering and Communications Technologies",
publisher = "Springer Science and Business Media Deutschland GmbH",
pages = "853--863",
booktitle = "Lecture Notes on Data Engineering and Communications Technologies",
address = "Germany",
}