Ian Pratt SVP, Products Bromium Inc.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Remus: High Availability via Asynchronous Virtual Machine Replication
Debugging operating systems with time-traveling virtual machines Sam King George Dunlap Peter Chen CoVirt Project, University of Michigan.
Content Overview Virtual Disk Port to Intel platform
Virtualization Technology
Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton)
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Bart Miller. Outline Definition and goals Paravirtualization System Architecture The Virtual Machine Interface Memory Management CPU Device I/O Network,
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Network Implementation for Xen and KVM Class project for E : Network System Design and Implantation 12 Apr 2010 Kangkook Jee (kj2181)
KVM/ARM: The Design and Implementation of the Linux ARM Hypervisor Fall 2014 Presented By: Probir Roy.
CS533 Concepts of OS Class 16 ExoKernel by Constantia Tryman.
The Origin of the VM/370 Time-sharing system Presented by Niranjan Soundararajan.
Xen and the Art of Virtualization. Introduction  Challenges to build virtual machines Performance isolation  Scheduling priority  Memory demand  Network.
Basics of Operating Systems March 4, 2001 Adapted from Operating Systems Lecture Notes, Copyright 1997 Martin C. Rinard.
E Virtual Machines Lecture 4 Device Virtualization
Tanenbaum 8.3 See references
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
1 UCR Firmware Attacks and Security introduction.
Virtualization The XEN Approach. Virtualization 2 CS5204 – Operating Systems XEN: paravirtualization References and Sources Paul Barham, et.al., “Xen.
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
Xen I/O Overview. Xen is a popular open-source x86 virtual machine monitor – full-virtualization – para-virtualization para-virtualization as a more efficient.
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
Virtualization: Not Just For Servers Hollis Blanchard PowerPC kernel hacker.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Our work on virtualization Chen Haogang, Wang Xiaolin {hchen, Institute of Network and Information Systems School of Electrical Engineering.
Background: Operating Systems Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
02/09/2010 Industrial Project Course (234313) Virtualization-aware database engine Final Presentation Industrial Project Course (234313) Virtualization-aware.
Bart Miller – October 22 nd,  TCB & Threat Model  Xen Platform  Xoar Architecture Overview  Xoar Components  Design Goals  Results  Security.
Microsoft Virtual Server: Overview and Roadmap Mike Neil Product Unit Manager Windows Virtualization microsoft.com Microsoft Corporation.
MATSUMOTO Hitoshi SCSI support on Xen MATSUMOTO Hitoshi Fujitsu Ltd.
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Security Architecture and Design Chapter 4 Part 1 Pages 297 to 319.
We will focus on operating system concepts What does it do? How is it implemented? Apply to Windows, Linux, Unix, Solaris, Mac OS X. Will discuss differences.
Operating Systems Security
Wireless and Mobile Security
Full and Para Virtualization
DATA COMPROMISE Controlling the flow of sensitive electronic information remains a major challenge, ranging from theft to accidental violation of policies.
Operating-System Structures
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor Michael LeMay Carl A. Gunter University of Illinois at Urbana-Champaign Modified.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Virtualization Neependra Khare
Virtualization.
Kernel Design & Implementation
CSC 482/582: Computer Security
Breaking Up is Hard to Do
Presented by Yoon-Soo Lee
NEWS LAB 薛智文 嵌入式系統暨無線網路實驗室
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Chapter 2: System Structures
Xen: The Art of Virtualization
Disco: Running Commodity Operating Systems on Scalable Multiprocessors
Virtualization & Security real solutions
Group 8 Virtualization of the Cloud
CIT 480: Securing Computer Systems
Introduction to Operating Systems
OS Virtualization.
Sai Krishna Deepak Maram, CS 6410
TPM, UEFI, Trusted Boot, Secure Boot
Outline Operating System Organization Operating System Examples
Operating Systems Structure
Xen and the Art of Virtualization
Presentation transcript:

Ian Pratt SVP, Products Bromium Inc. .org µ-Xen Ian Pratt SVP, Products Bromium Inc.

Architecture and implementation Evolutionary path Outline µ-Xen Goals Architecture and implementation Evolutionary path Use case: Bromium end-point security

The µ-Xen Client Hypervisor Derived from the Xen code base Designed to address client hypervisor deployment challenges Designed to achieve a high-degree of security assurance No requirement to support legacy s/w or h/w Optimized to support micro-virtualization Evolution to a new class of hypervisor

Evolution to a new class of hypervisor Start with a self-contained type-2 Host kernel module containing µ-Xen blob Well-defined interface to/from the host Memory allocation, Schedule VCPUs, Timers, Events Similar to hXen project Windows, OS X; easily portable µ-Xen drives VT hardware, leaves IO and other hardware to host OS

µ-Xen streamlines Xen code base x64 only No support for systems that are not VTx/EPT or AMDV/NPT capable No support for PV MMU guests Significant code size reductions No compat code Separate build target Future: slim down instruction emulator

µ-Xen virtual IO µ-Xen demultiplexes IORecs and events to multiple host processes per VM Able to have separate video, audio, disk, net etc processes Helps scheduling latency, enables better exploitation mitigation lock-down Use just the relevant parts of QEMU User-space PV backend drivers Post-boot virtual IO device revocation

Support for large numbers of similar VMs Support for VM fork Simple extension of Populate on Demand code Tree of templates/VMs supported PV driver support for re-sharing free pages IO tracking to re-share swapped and re-read pages

Evolution to a new class of hypervisor Goal: host is responsible for resource allocation, but can not interfere with the privacy or integrity of the hypervisor or other guests, e.g.: Hypervisor asks host for memory, receives it, then removes host access to it Host may perform IO on behalf of hypervisor and guests, but must be privacy and integrity protected Host may deny service, crash; IO tamper detectable

De-privilege host into a VT container Remove host access to hypervisor and guest memory in EPT tables h/w devices passed through to host, VTd protected Device models can only access Granted memory Require PV network and disk as no virtual DMA Guest IO buffers encrypted/authenticated before grant copy/map Save/restore, dom builder must first have guest memory encrypted/authenticated by hypervisor Hypervisor paging requires similar treatment

Further Enhanced Security Migrate certain host h/w devices to ownership by hypervisor or privileged guest(s), replace with virtual device E.g. Keyboard controller to avoid key logging Possibly WiFi/NIC too Measured launch of hypervisor TXT/TPM to establish DRoT Remote attestation of hypervisor configuration

Task-based Micro-virtualization 11

The Challenge !

What Went Wrong? Poor Isolation leads to Vulnerability Multi-tenancy of code (& data) from a huge set of trust sources Code & Data are executed in the context of a few, weakly organized and poorly isolated “bins” representing levels of trust - e.g. UID, GID, PID Overloaded, complex specs & buggy implementations of porous interfaces Thus malware can: Access data and documents in the same “bin” Subvert other good code that is placed into the same “bin” Use another bug in an App or OS to elevate its privilege

Why Legacy Security Solutions Fail Black-listing: Detection is not protection Doesn’t protect users from zero day attacks Unable to detect targeted & advanced malware White-listing: Restriction is not protection Users want to be productive Attackers can compromise trusted applications and web sites dynamic content cannot be blacklisted malicious content can compromise whitelisted apps

The Challenge How do we plan for the unknown threat? What do we do about human mistakes? Bromium Confidential

The Micro-Virtualization Approach Next generation endpoint security A pragmatic approach to trusted computing Based on hardware based isolation and not detection Contain risky activity from corporate data and network Block zero day and polymorphic threats Provides isolation & trust through hardware virtualization

Micro-Virtualization Lightweight, fast, hidden, with an unchanged native UX Virtualizes vulnerable tasks within a single Windows desktop Hypervisor Small code base for maximum security I/O Virtualization (VT-d) TXT & TPM based hardware root of trust Hardware Virtualization (VT-x)

Windows and IT provisioned apps are trusted The Microvisor isolates vulnerable tasks from Windows, each other & key system resources Windows and IT provisioned apps are trusted Micro-VMs have “least privilege” access to files, networks & devices, and execute CoW Microvisor Each vulnerable task is instantly isolated in a micro-VM, invisible to the user Kernel OS Libs Apps

Demo

Key Threat Vectors Are Isolated Web Browsing External Documents E-mail Attachments USB files

µ-Xen is targeted at client systems Conclusions µ-Xen is targeted at client systems Combines ease of deployment with useful security properties Enables task-based micro-virtualization, allowing mandatory access control to be retrofitted to commodity client OSes We’re hiring! Please email ian@bromium.com