Virtually Secure Oded Horovitz VMware R&D CanSecWest March, 2008.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Debugging operating systems with time-traveling virtual machines Sam King George Dunlap Peter Chen CoVirt Project, University of Michigan.
Ian Pratt SVP, Products Bromium Inc.
Virtualization Technology
Virtualisation From the Bottom Up From storage to application.
Software & Services Group PinPlay: A Framework for Deterministic Replay and Reproducible Analysis of Parallel Programs Harish Patil, Cristiano Pereira,
Secure In-VM Monitoring Using Hardware Virtualization Monirul Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi Presented by Tyler Bletsch.
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
Difference Engine: Harnessing Memory Redundancy in Virtual Machines by Diwaker Gupta et al. presented by Jonathan Berkhahn.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
Bart Miller. Outline Definition and goals Paravirtualization System Architecture The Virtual Machine Interface Memory Management CPU Device I/O Network,
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
Presented by Boris Yurovitsky
SubVirt: Implementing malware with virtual machines Yi-Min Wang Chad Verbowski Helen J. Wang Jacob R. Lorch Microsoft Research Samuel T. King Peter M.
Jiang Wang, Joint work with Angelos Stavrou and Anup Ghosh CSIS, George Mason University HyperCheck: a Hardware Assisted Integrity Monitor.
Virtualization for Cloud Computing
5205 – IT Service Delivery and Support
Basics of Operating Systems March 4, 2001 Adapted from Operating Systems Lecture Notes, Copyright 1997 Martin C. Rinard.
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
Tanenbaum 8.3 See references
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
1 UCR Firmware Attacks and Security introduction.
Benefits: Increased server utilization Reduced IT TCO Improved IT agility.
Cosc 4010 Sandboxing. Last lecture Last time, we covered chroot, which is a method to "sandbox" a problem. –Not full proof by any means. Many simple mistakes.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Stealthy Malware Detection Through VMM-based “Out-of-the-Box” Semantic View Reconstruction CCS’07, Alexandria, VA, Oct 29 – Nov 2, 2007 Xuxian Jiang, Xinyuan.
Ether: Malware Analysis via Hardware Virtualization Extensions Author: Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee Presenter: Yi Yang Presenter:
Operating Systems ECE344 Ashvin Goel ECE University of Toronto OS-Related Hardware.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Operating Systems Security
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Security Vulnerabilities in A Virtual Environment
Wireless and Mobile Security
Full and Para Virtualization
Lecture 26 Virtual Machine Monitors. Virtual Machines Goal: run an guest OS over an host OS Who has done this? Why might it be useful? Examples: Vmware,
Protecting The Kernel Data through Virtualization Technology BY VENKATA SAI PUNDAMALLI id :
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor Michael LeMay Carl A. Gunter University of Illinois at Urbana-Champaign Modified.
Class Presentation Pete Bohman, Adam Kunk, Erik Shaw (ONL)
CSE 451: Operating Systems Winter 2015 Module 25 Virtual Machine Monitors Mark Zbikowski Allen Center 476 © 2013 Gribble, Lazowska,
VMM Based Rootkit Detection on Android
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Virtualization for Cloud Computing
Virtualization.
Introduction to Operating Systems
OS Virtualization.
Virtualization Layer Virtual Hardware Virtual Networking
Virtualization Techniques
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Sai Krishna Deepak Maram, CS 6410
Shielding applications from an untrusted cloud with Haven
Virtually Secure Oded Horovitz VMware R&D CanSecWest March, 2008
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
System Virtualization
Presentation transcript:

Virtually Secure Oded Horovitz VMware R&D CanSecWest March, 2008

2 Talk Overview Setup Virtualization 101 Talk Focus VM Introspection Capabilities Sample Use Cases (and demos)‏ Magics Retrospective Security Misc & QA

3 Virtualization 101 Hypervisor / Kernel Hardware Virtual Machine Monitor (VMM)‏ Device Virtualization OS Device Virtualization App... Stora ge CPUNetwork Management Interfaces Key Terms VMM Hypervisor Hosted Bare Metal Setup

4 Talk Focus Virtualization Based Capabilities Better than physical Hypervisor as a Base of Trust Security as an infrastructure service Also Important But not Today Secure Virtualization Infrastructure Secure & Manageable Platform Physical Equivalent Security Support existing tools and agents Prevent security coverage loss when P2V Setup

5 Security Agent – common agents File System AV Mail Server Anti Spam Network Stack Firewall Browser Anti Phishing OS HIPS Hypervisor ? Introspection

6 Physical Security - Shortcomings Mal ware pack packer Mal ware Un packer File System Write file AV Loader Read file CPU Instantiate Packed malware Rewrite self Mal ware exec file Code Packing AV see packed file Unpacking method is unknown No opportunity for detection Introspection

7 Physical Security - shortcoming Buggy code exploit CPU execute Vulnerabilities Buggy service is exploited New code is injected File system never sees the new code (unless it is paged out..)‏ Existing solutions Program shepherding ASLR NX No good coverage for kernels Introspection

8 Physical Security - shortcoming OS coverage Agent is depended on its host (instantiated by host)‏ A window of opportunity exist to subvert system Solution - Boot into alternate OS and scan? PlatformBIOS Boot Loader Devices code OSdrivers apps AV reset Introspection

9 CPU events Privileged instruction Exceptions Interrupts I/O Arbitrary Instruction op-code Instruction breakpoint Control flow VM Introspection HV unfriendly

1010 VM Introspection Memory event Granular CPU read / write Granular device read / write Linear addressing Page granularity Physical addressing Memory CPU Device Read / write Read / write / “execute” HV unfriendly High overhead

1 VM Introspection – VMware initiatives VM Debugging GDB like interface Designed for human user Agent is on the network Capabilities Examine CPU, memory Single step invisible breakpoints Page table walker Some symbol information support

1212 VM Introspection – VMware Initiatives VProbes dtrace like goals Designed for human user / analysis tools Agent runs within the hypervisor Specialized scripting VM Capabilities Dynamic probing point installation Inline execution with the hypervisor Access to VM state Access to hypervisor state

1313 VM Introspection - VMware Initiatives Security API’s Designed for security productization Agent runs within a VM Capabilities Memory access events Selected CPU events VM lifecycle events Access to VM memory & CPU state Page Table walker

1414 Security APIs (VMsafe)‏ Goals Better than physical Exploit hypervisor interposition to place new security agent Provide security coverage for the VM kernel (and applications)‏ Hypervisor as a Base of Trust Divide responsibilities between the hypervisor and in-VM agent The hypervisor covers the VM kernel, the rest is done from within the VM Insure in-VM security agent execution and correctness Security as an infrastructure service “Agent less” security services for VMs Flexible OS independent solutions Introspection

1515 Verify-Before-Execute Flow Introspection “Hypervisor” VM Security Agent Power On Page access event VM Information CPU State & Memory Pages Query VM Install Triggers Query CPU & Memory state Install / Remove Triggers Power Off

1616 Sample Introspection Agents Verify-Before-Execute Utilize memory introspection to validate all executing pages Flow 1.Trace all pages for execution access 1.On execution detection Trace for page modification Verify if page contain malware Remove execution trace 1.On modification detection Trace for execution Remove modification trace NX NX / NW NX Is bad? NW NW / NX NX NX / NW

1717 Security APIs – Use cases VM Kernel coverage Detect infection in early boot process Device opt ROM attacks Boot loader Boot records OS image Detect code injection due to kernel vulnerabilities Detect self modifying code in kernel Lock kernel after initialization Introspection

1818 Case Study - Microsoft Patch Guard Goal Prevent patching of (x64 based) kernels Force ISV to behave nicely Prevent Root-kits ?? Implementation Obfuscated Invocation Obfuscated Persistence Evolving (Thanks to the awesome work from uninformed.org)‏ What's The Problem? Circumventable Complicated Only for x64 based Windows Systems Introspection

1919 Kernel Security Demo “MyPatchGuard” Secure & Isolated Agent Inline enforcement using memory write triggers. Protect Windows XP guest syscalls table Simple. Introspection

2020 Security APIs – Use cases cont’ Watch dog services Liveness check for in-VM security agent Detect agent presence Verify agent periodic execution Protect agent code and static data Introspection

2121 TPM vs. Introspection TPM Root of trust rely on hardware Passive device Platform and software stack decide what to measure Need software update to change measurement coverage Can not detect compromise in software stack since verification VM Introspection Root of trust rely on hypervisor Introspection agent have the initiative Security vendor / policy dictate what to measure Coverage is content, and can change independently of VM Designed to continuously scan VMs and to detect compromise Introspection

2 VMsafe – Network Introspection Capabilities Place an inline network agent on any VM virtual nic Allow reading, injecting, modifying, and dropping packets. Benefits Efficiently monitor inter-VM network communication Integrated support for live migration. Virtualization only applications Correlate VM internals with network policy. (using CPU/ Memory inspections one can learn OS version, patch level, configuration etc)‏ Build a trusted distributed firewall. Introspection

2323 Talk Overview Setup Virtualization 101 Talk Focus VM Introspection Capabilities Sample Use Cases (and demos)‏ Magics Retrospective Security Misc & QA

2424 Retrospective Security Motivation Detect whether you have been attacked in the past Detect if you might be still compromised by a past attack Method VMware Record & Replay allow for a deterministic replay of VM using recorded logs Potentially the recordings have captured an attack The security API’s are detached from the recorded VM (unlike in- VM agent) and can attach to a replay session Magics

2525 Retrospective Security Demo What is it good for? Run more aggressive policies that will not be acceptable in production environments Discover 0days used to exploit your system Learn how the malware / attacker have navigated your system Use data tainting technique to detect any side effects that still exist on your system Possibly clean the finding from last step on your production VM. Learn about the scope of the damage done to your system, i.e. what is the extent of data leakage Magics

2626 Security vs. Hardware Virtualization 1 st Generation – SVM, VT-X VMM no longer need to run the VM kernel under binary translation Security Trade off – Code Breakpoint, Guest code patching (while translating), Control flow visibility 2 nd Generation – NPT, EPT VMM no longer need to have software based MMU Security Trade off – Tracking LA->PA mapping is becoming expensive, resulting with inability to operate on linear addresses. 3 rd Generation – IO MMU, VT-D VMM can assign physical devices to VMs without worry of VM escape or hypervisor corruption Security Trade off – Interposition on the pass-thru device is eliminated Misc

2727 Some New Problems To Solve VM Escape Though impossible by design, the hypervisor can still have implementation vulnerabilities * As more trust is placed in the hypervisor the more motivation there will be to find VM escapes VM escape provide a new “hyper escalation” that never existed before. Misc

2828 Some New Problems To Solve New attacks to consider VMs as malware A malicious VM with the proper isolation configuration can exploit the host system using writable shared folder In a similar way, a VM that is not firewalled properly can easily access the host network or any device reachable by the host network Moral of the story – Handle suspicious VMs with care. Misc

2929 Conclusion Questions? Contact