Download presentation
Presentation is loading. Please wait.
Published byCamilla Carson Modified over 9 years ago
2
Research at FRIENDS Lab http://friends.cs.purdue.edu Dongyan Xu Associate Professor Department of Computer Science and Center for Education and Research in Information Assurance and Security (CERIAS) Purdue University
3
Virtual Infrastructures VIOLIN virtual infrastructure Infrastructure adaptation Infrastructure snapshot Real-world deployment (http://www.nanohub.org) Research Overview Malware Defense Honeyfarm (Collapsar) Playground (vGround) VM introspection (OBSERV) OS info. flow (Proc. Coloring) Kernel rootkit (NICKLE) Reverse engr. (AutoFormat) Virtualization Technology (Xen, QEMU, VirtualBox, KVM, VMware)
4
Project 1: Process Coloring: Information Flow-based Malware Defense Funded by IARPA through AFRL One-sentence summary: Propagating and logging provenance information (“colors”) along OS-level information flows for malware detection and sensitive data protection Prototype integration with Southwest Research Institute Demo CD completed today!
5
httpd s80httpdrcinit s45named s30sendmail s55sshd s80httpd s30sendmail s45named s55sshd /bin/sh wget Rootkit Local files netcat /etc/shadow Confidential Info /etc/shadow Confidential Info Initial coloring Coloring diffusion Syscall Log Capability 3: Color-based log partition for contamination analysis Capability 3: Color-based log partition for contamination analysis PC Usage Scenario: Server-Side Malware Defense Capability 1: PC malware alert “No shell process should have the color of Apache” Capability 1: PC malware alert “No shell process should have the color of Apache” Capability 2: Color-based identification of malware break-in point Capability 2: Color-based identification of malware break-in point Demo at: http://friends.cs.purdue.edu/projects/pc/pc-demo.html
6
firefox notepad turbotax warcraft Web Browser Tax Editor Games Agobot Tax files PC Usage Scenario: Client-Side Malware Defense Agobot www.malicious.net PC malware alert “Web browser and tax colors should never mix” PC malware alert “Web browser and tax colors should never mix” Demo at: http://friends.cs.purdue.edu/projects/pc/files/sinkfile.avi
7
Project 2: Strategic Defense against Kernel Rootkit Attacks Kernel rootkits: stealthy and foundational threat to cyberspace Current defense: Symptom-based detection Disruption to production system Manual forensics Strategic defense: Proactive indication before attack Automatic avoidance by “steering away” production system (non-stop operation) Live forensics for future protection
8
Integrated Defense Scenario Guest OS VMM Right before attack After threat indication Production VM Fork Avoidance Indication Guest OS VMM Forensics VM Guest OS VMM Production VM Rootkit Profile Kernel Guarding Code Clean-up Forensics
9
Results with Real-World Kernel Rootkits Indicating and preventing kernel rootkit attacks at VMM level [RAID08 Best Paper Award]
10
Thank you! For more information: URL: http://friends.cs.purdue.edu (on a VM)http://friends.cs.purdue.edu Google: “Purdue virtualization friends” Email: dxu@cs.purdue.edu
11
NICKLE: Kernel Rootkit Indicator “ No Instruction Creeping into Kernel Level Executed” NICKLE Standard memory Kernel Code Shadow memory VMM Guest OS Step 1: Create two memory spaces Standard memory Shadow memory Step 2: Authenticate and copy kernel code to shadow memory Step 3: Memory access dispatch Kernel code fetch -> shadow memory All other accesses -> standard memory Kernel Code
12
Collapsar Honeyfarm Domain B Domain A Domain C Front-End VM-based Honeypots Management Station Collapsar Center Correlation Engine Redirector Collapsar Honeyfarm Redirector Benefit 1: Centralized management of honeypots w/ distributed presence Benefit 2: Off-site attack occurrence Benefit 3: Convenience for real-time attack correlation and log mining [USENIX Security’04]
13
Malicious Web Server VM-based Honeypots Domain B Domain A Domain C Front-End Collapsar Center Redirector Collapsar as a Client-side Honeyfarm Active Honeypots w/ Vulnerable Client-side Software Web Browsers (e.g., IE, Firefox, …) Email Clients (e.g., Outlook, …) [ HoneyMonkey, NDSS’06] PlanetLab (310 sites) 288 malicious sites / 2 zero-day exploits
14
Upon Clicking a malicious URL http://xxx.9x.xx8.8x/users/xxxx/xxx/laxx/z.html 22 unwanted programs installed without user’s consent! MS04-013 MS03-011 MS05-002 * {CURSOR: url("http://vxxxxxxe.biz/adverts/033/sploit.anr")} try{ document.write('<object data=`ms-its: mhtml:file: //C:\fo'+'o.mht!'+'http://vxxxx'+'xxe.biz//adv'+'erts//033//targ.ch'+ 'm::/targ'+'et.htm` type=`text/x-scriptlet`> '); }catch(e){} A Real Incident [JPDC’06]
15
vGround: A Virtual Worm Playground (demo) dallas.cs.purdue.edu High fidelity VM: full-system virtualization Strict confinement VN: link-layer network virtualization Easy deployment Locally deployable Efficient experiments Images generation time: 60 seconds Boot-strap time: 90 seconds Tear-down time: 10 seconds A Worm Playground In “Fighting Computer Virus Attacks”, Peter Szor, USENIX Security Symp., 2004 [RAID’05]
16
State-of-the-art malware defense Running anti-malware software inside the monitored system Advantage: They can see everything (e.g., files, processes…) Disadvantage: They may not see anything! VirusScanFirefox IE OS Kernel … OBSERV: “Out-of-the-Box” Malware Detection
17
Why “Out-of-the-Box”? Current approach fundamentally flawed Anti-malware software and protected software running at the same privilege level Lack of root-of-trust Solution: Going “out-of-the-box” Firefox IE OS Kernel … VirusScan Virtual Machine Monitor (VMM)
18
The “Semantic-Gap” Challenge What we can observe: Low-level states Memory pages, disk blocks… Low-level events Privileged instructions, Interrupts, I/O… What we want to observe: High-level semantic states Files, processes… high-level semantic events System calls, context switches… Virtual Machine Monitor (e.g., VMware, Xen) Guest OS Semantic Gap VirusScan
19
Our Solution: OBSERV OBSERV: “Out-of-the-Box” with SEmantically Reconstructed View A new mechanism missing in existing VMMs Firefox IE OS Kernel … Virtual Machine Monitor (VMM) OBSERV [ACM CCS’07]
20
New Capabilities Enabled by OBSERV Capability II: Malware detection by view comparison Capability II: Malware detection by view comparison Capability I: Invisible system logging Capability I: Invisible system logging Firefox IE OS Kernel … Virtual Machine Monitor (VMM) OBSERV Capability III: External run of COTS anti-malware software Capability III: External run of COTS anti-malware software OBSERV View Inside-the-box View Diff
21
AutoFormat: Malware Protocol Reverse Engineering Given malware binary, infer malware protocol format [NDSS’08]
22
Inferring Slapper Worm (Botnet) Protocol Nested data structure declaration Compiler inserted gap 1 2 3 1 2
23
VIOLIN: Portable, Adaptive Virtual Environments Adaptive Virtual Environments on a shared hosting infrastructure Internet DB [TR’03, IEEE Computer’05]
24
Adaptation Architecture and Sample Scenario (Demo) VIOLIN Switch Monitoring Daemon VIOLIN Switch Monitoring Daemon VIOLIN Switch Monitoring Daemon Adaptation Manager VMs Physical Network Scale Up CPU Update Migrate VMM VIOLIN Switch [IEEE ICAC’06]
25
Live VIOLIN Snapshot (Demo) Useful for application and OS transparent recovery from Crashes, failures, and disasters Unexpected power/network outage And for VIOLIN replay Hosting center SnapshotResume [ACM/IEEE VTDC’07]
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.