Approaches for protecting sensitive data within a guest operating system
First Claim
1. A non-transitory computer-readable storage medium storing instructions for supplying a guest operating system to a virtual machine, which when executed by one or more processors, cause:
- in response to receiving data that identifies where, within a guest operating system, sensitive data is located, updating a data structure to identify where the sensitive data is located within the guest operating system;
in response to receiving, from a requestor, a request to access a portion of the guest operating system, determining whether the data structure indicates that the requested portion of the guest operating system contains sensitive data; and
upon determining that the requested portion of the guest operating system does contain sensitive data, informing the requestor that a disk fault has occurred to cause the requestor to abort the request.
3 Assignments
0 Petitions
Accused Products
Abstract
Approaches for preventing unauthorized access of sensitive data within an operating system (OS), e.g., a guest OS used by a virtual machine. Dummy data may be written over physical locations on disk where sensitive data is stored, thereby preventing a malicious program from accessing the sensitive data. Alternately, a delete operation may be performed on sensitive data within an OS, and thereafter the OS is converted into a serialized format to expunge the deleted data. The serialized OS is converted into a deserialized form to facilitate its use. Optionally, a data structure may be updated to identify where sensitive data is located within an OS. When a request to access a portion of the OS is received, the data structure is consulted to determine whether the requested portion contains sensitive data, and if so, dummy data is returned to the requestor without consulting the requested portion of the OS.
112 Citations
12 Claims
-
1. A non-transitory computer-readable storage medium storing instructions for supplying a guest operating system to a virtual machine, which when executed by one or more processors, cause:
-
in response to receiving data that identifies where, within a guest operating system, sensitive data is located, updating a data structure to identify where the sensitive data is located within the guest operating system; in response to receiving, from a requestor, a request to access a portion of the guest operating system, determining whether the data structure indicates that the requested portion of the guest operating system contains sensitive data; and upon determining that the requested portion of the guest operating system does contain sensitive data, informing the requestor that a disk fault has occurred to cause the requestor to abort the request. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus for supplying a guest operating system to a virtual machine, which when executed by one or more processors, comprising:
-
one or more processors; and one or more non-transitory computer-readable storage mediums storing one or more sequences of instructions, which when executed, cause; in response to receiving data that identifies where, within a guest operating system, sensitive data is located, updating a data structure to identify where the sensitive data is located within the guest operating system; in response to receiving, from a requestor, a request to access a portion of the guest operating system, determining whether the data structure indicates that the requested portion of the guest operating system contains sensitive data; and upon determining that the requested portion of the guest operating system does contain sensitive data, informing the requestor that a disk fault has occurred to cause the requestor to abort the request. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification