Virtually Secure Oded Horovitz VMware R&D CanSecWest March, 2008

Slides:



Advertisements
Similar presentations
Debugging operating systems with time-traveling virtual machines Sam King George Dunlap Peter Chen CoVirt Project, University of Michigan.
Advertisements

Content Overview Virtual Disk Port to Intel platform
Virtualization Technology
Virtualisation From the Bottom Up From storage to application.
Secure In-VM Monitoring Using Hardware Virtualization Monirul Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi Presented by Tyler Bletsch.
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Presented by Boris Yurovitsky
Jiang Wang, Joint work with Angelos Stavrou and Anup Ghosh CSIS, George Mason University HyperCheck: a Hardware Assisted Integrity Monitor.
Virtualization for Cloud Computing
5205 – IT Service Delivery and Support
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Tanenbaum 8.3 See references
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Virtually Secure Oded Horovitz VMware R&D CanSecWest March, 2008.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
Benefits: Increased server utilization Reduced IT TCO Improved IT agility.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Ether: Malware Analysis via Hardware Virtualization Extensions Author: Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee Presenter: Yi Yang Presenter:
Operating Systems ECE344 Ashvin Goel ECE University of Toronto OS-Related Hardware.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Operating Systems Security
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Security Vulnerabilities in A Virtual Environment
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
Full and Para Virtualization
Lecture 26 Virtual Machine Monitors. Virtual Machines Goal: run an guest OS over an host OS Who has done this? Why might it be useful? Examples: Vmware,
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor Michael LeMay Carl A. Gunter University of Illinois at Urbana-Champaign Modified.
Class Presentation Pete Bohman, Adam Kunk, Erik Shaw (ONL)
CSE 451: Operating Systems Winter 2015 Module 25 Virtual Machine Monitors Mark Zbikowski Allen Center 476 © 2013 Gribble, Lazowska,
VMM Based Rootkit Detection on Android
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Virtualization-optimized architectures
Virtualization for Cloud Computing
Introduction to Virtualization
Virtualization.
Virtual Machine Monitors
Chapter 6: Securing the Cloud
Virtualization Technology
Virtualization Dr. Michael L. Collard
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Secure Software Confidentiality Integrity Data Security Authentication
Operating System Structure
Virtualization & Security real solutions
Group 8 Virtualization of the Cloud
Device Guard: AppLocker on steroids
Introduction to Operating Systems
OS Virtualization.
Virtualization Layer Virtual Hardware Virtual Networking
Virtualization Techniques
Windows Virtual PC / Hyper-V
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Sai Krishna Deepak Maram, CS 6410
Shielding applications from an untrusted cloud with Haven
Vinod Ganapathy securely How to snapshot memory Vinod Ganapathy
Basic Dynamic Analysis VMs and Sandboxes
Xen and the Art of Virtualization
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
System Virtualization
Presentation transcript:

Virtually Secure Oded Horovitz VMware R&D CanSecWest March, 2008

Talk Overview Setup VM Introspection Magics Misc & QA Virtualization 101 Talk Focus VM Introspection Capabilities Sample Use Cases (and demos)‏ Magics Retrospective Security Misc & QA

Virtualization 101 Setup ... ... Hypervisor / Kernel Hardware Key Terms VMM Hypervisor Hosted Bare Metal App App ... Management Interfaces OS Device Virtualization Device Virtualization Virtual Machine Monitor (VMM)‏ ... Hypervisor / Kernel Hardware Network Storage CPU

Talk Focus Setup Virtualization Based Capabilities Better than physical Hypervisor as a Base of Trust Security as an infrastructure service Also Important But not Today Secure Virtualization Infrastructure Secure & Manageable Platform Physical Equivalent Security Support existing tools and agents Prevent security coverage loss when P2V

Security Agent – common agents Introspection AV Anti Spam Firewall Anti Phishing File System Mail Server Network Stack Browser HIPS ? OS Hypervisor

Physical Security - Shortcomings Introspection Code Packing AV see packed file Unpacking method is unknown No opportunity for detection Mal ware packer pack Rewrite self Un packer ware Mal Packed malware Mal ware Write file Instantiate AV File System Loader CPU Read file exec file

Physical Security - shortcoming Introspection Vulnerabilities Buggy service is exploited New code is injected File system never sees the new code (unless it is paged out..)‏ Existing solutions Program shepherding ASLR NX No good coverage for kernels exploit Buggy code CPU execute

Physical Security - shortcoming Introspection OS coverage Agent is depended on its host (instantiated by host)‏ A window of opportunity exist to subvert system Solution - Boot into alternate OS and scan? OS drivers Boot Loader reset Platform BIOS apps Devices code AV

VM Introspection Privileged instruction Exceptions Interrupts I/O CPU events Privileged instruction Exceptions Interrupts I/O Arbitrary Instruction op-code Instruction breakpoint Control flow HV unfriendly

VM Introspection Granular CPU read / write Memory event Granular CPU read / write Granular device read / write Linear addressing Page granularity Physical addressing HV unfriendly High overhead CPU Device Read / write / “execute” Read / write Memory

VM Introspection – VMware initiatives VM Debugging GDB like interface Designed for human user Agent is on the network Capabilities Examine CPU, memory Single step invisible breakpoints Page table walker Some symbol information support

VM Introspection – VMware Initiatives VProbes dtrace like goals Designed for human user / analysis tools Agent runs within the hypervisor Specialized scripting VM Capabilities Dynamic probing point installation Inline execution with the hypervisor Access to VM state Access to hypervisor state

VM Introspection - VMware Initiatives Security API’s Designed for security productization Agent runs within a VM Capabilities Memory access events Selected CPU events VM lifecycle events Access to VM memory & CPU state Page Table walker

Security APIs (VMsafe)‏ Introspection Goals Better than physical Exploit hypervisor interposition to place new security agent Provide security coverage for the VM kernel (and applications)‏ Hypervisor as a Base of Trust Divide responsibilities between the hypervisor and in-VM agent The hypervisor covers the VM kernel, the rest is done from within the VM Insure in-VM security agent execution and correctness Security as an infrastructure service “Agent less” security services for VMs Flexible OS independent solutions

Verify-Before-Execute Flow Introspection VM Security Agent Power On “Hypervisor” Query VM VM Information Install Triggers Page access event Query CPU & Memory state CPU State & Memory Pages Install / Remove Triggers Power Off

Sample Introspection Agents Verify-Before-Execute Utilize memory introspection to validate all executing pages Flow Trace all pages for execution access On execution detection Trace for page modification Verify if page contain malware Remove execution trace On modification detection Trace for execution Remove modification trace NX NX NX NX NX NX NX NX NX NX / NW NX / NW Is bad? NW NW / NX NX

Security APIs – Use cases Introspection VM Kernel coverage Detect infection in early boot process Device opt ROM attacks Boot loader Boot records OS image Detect code injection due to kernel vulnerabilities Detect self modifying code in kernel Lock kernel after initialization

Case Study - Microsoft Patch Guard Introspection Goal Prevent patching of (x64 based) kernels Force ISV to behave nicely Prevent Root-kits ?? Implementation Obfuscated Invocation Obfuscated Persistence Evolving (Thanks to the awesome work from uninformed.org)‏ What's The Problem? Circumventable Complicated Only for x64 based Windows Systems

Introspection Kernel Security Demo “MyPatchGuard” Secure & Isolated Agent Inline enforcement using memory write triggers. Protect Windows XP guest syscalls table Simple.

Security APIs – Use cases cont’ Introspection Watch dog services Liveness check for in-VM security agent Detect agent presence Verify agent periodic execution Protect agent code and static data

TPM vs. Introspection Introspection TPM VM Introspection Root of trust rely on hardware Passive device Platform and software stack decide what to measure Need software update to change measurement coverage Can not detect compromise in software stack since verification VM Introspection Root of trust rely on hypervisor Introspection agent have the initiative Security vendor / policy dictate what to measure Coverage is content, and can change independently of VM Designed to continuously scan VMs and to detect compromise

VMsafe – Network Introspection Capabilities Place an inline network agent on any VM virtual nic Allow reading, injecting, modifying, and dropping packets. Benefits Efficiently monitor inter-VM network communication Integrated support for live migration. Virtualization only applications Correlate VM internals with network policy. (using CPU/ Memory inspections one can learn OS version, patch level, configuration etc)‏ Build a trusted distributed firewall.

Talk Overview Setup VM Introspection Magics Misc & QA Virtualization 101 Talk Focus VM Introspection Capabilities Sample Use Cases (and demos)‏ Magics Retrospective Security Misc & QA

Retrospective Security Magics Motivation Detect whether you have been attacked in the past Detect if you might be still compromised by a past attack Method VMware Record & Replay allow for a deterministic replay of VM using recorded logs Potentially the recordings have captured an attack The security API’s are detached from the recorded VM (unlike in- VM agent) and can attach to a replay session

Retrospective Security Magics Demo What is it good for? Run more aggressive policies that will not be acceptable in production environments Discover 0days used to exploit your system Learn how the malware / attacker have navigated your system Use data tainting technique to detect any side effects that still exist on your system Possibly clean the finding from last step on your production VM. Learn about the scope of the damage done to your system, i.e. what is the extent of data leakage

Security vs. Hardware Virtualization Misc 1st Generation – SVM, VT-X VMM no longer need to run the VM kernel under binary translation Security Trade off – Code Breakpoint, Guest code patching (while translating), Control flow visibility 2nd Generation – NPT, EPT VMM no longer need to have software based MMU Security Trade off – Tracking LA->PA mapping is becoming expensive, resulting with inability to operate on linear addresses. 3rd Generation – IO MMU, VT-D VMM can assign physical devices to VMs without worry of VM escape or hypervisor corruption Security Trade off – Interposition on the pass-thru device is eliminated

Some New Problems To Solve Misc VM Escape Though impossible by design, the hypervisor can still have implementation vulnerabilities * As more trust is placed in the hypervisor the more motivation there will be to find VM escapes VM escape provide a new “hyper escalation” that never existed before. * It seems that this statement have created some confusion. “Impossible by design” means that the hypervisor isolation architecture is sound and complete. Still, the soundness of the design cannot prevent implementation errors.

Some New Problems To Solve Misc New attacks to consider VMs as malware A malicious VM with the proper isolation configuration can exploit the host system using writable shared folder In a similar way, a VM that is not firewalled properly can easily access the host network or any device reachable by the host network Moral of the story – Handle suspicious VMs with care.

Conclusion Questions? Contact odedh@vmware.com