New development in cloud cyber security: 'Space travel' technique allows machine to travel virtually to another system

Sep 19, 2012

(Phys.org)—UT Dallas computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or anything else that could cause a computer to malfunction.

The technique has been dubbed "" because it sends to a world outside its home, and bridges the gap between computer hardware and .

"Space travel might change the daily practice for many services offered virtually for cloud providers and data centers today, and as this technology becomes more popular in a few years, for the user at home on their desktops," said Dr. Zhiqiang Lin, the research team's leader and an assistant professor of computer science in the Erik Jonsson School of Engineering and Computer Science.

As cloud computing is becoming more popular, new techniques to protect the systems must be developed. Since this type of computing is Internet-based, skilled computer specialists can control the main part of the system virtually – using software to emulate hardware.

Lin and his team programmed space travel to use existing code to gather information in a computer's memory and automatically transfer it to a secure virtual machine – one that is isolated and protected from outside interference.

"You have an exact copy of the operating system of the computer inside the secure virtual machine  that a hacker can't compromise," Lin said. "Using this machine, then the user or antivirus software can understand what's happening  with the space traveled computer setting off red flags if there is any intrusion.

Previously, had to write such tools manually.

"With our technique, the tools already being used on the computer become part of the defense process," he said.

The gap between virtualized computer hardware and software operating on top of it was first characterized by Drs. Peter Chen and Brian Noble, faculty members from the University of Michigan.

"The ability to leverage existing code goes a long way in solving the gap problem inherent to many types of services," said Chen, the Arthur F. Thurnau Professor of Electrical Engineering and Computer Science, who first proposed the gap in 2001. "(Yangchun) Fu and Lin have developed an interesting way to take existing code from a trusted system and automatically use it to detect intrusions."

Lin said the space travel technique will help the FBI understand what is happening inside a suspect's even if he is physically miles away, instead of having to buy expensive software.

Space travel was presented at the most recent IEEE Symposium on Security and Privacy. Lin developed this with Yangchun Fu, a research assistant in .

"This is the top conference in cybersecurity, said Bhavani Thuraisingham, executive director of the UT Dallas Cyber Security Research and Education Center and a Louis A. Beecherl Jr. Distinguished Professor in the Jonsson School. "It is a major breakthrough that virtual developers no longer need to write any code to bridge the gap by using the technology invented by Dr. Lin and Mr. Fu. This research has given us tremendous visibility among the cybersecurity research community around the world."

Explore further: Artificial intelligence identifies the musical progression of the Beatles

Related Stories

Activity sensing with software sensors

Jun 22, 2010

A computer science researcher at the University of Leicester has investigated a technique which senses the activity of the user with the help of computer software systems.

Recommended for you

Designing exascale computers

Jul 23, 2014

"Imagine a heart surgeon operating to repair a blocked coronary artery. Someday soon, the surgeon might run a detailed computer simulation of blood flowing through the patient's arteries, showing how millions ...

User comments : 0