SubVirt: Implementing malware with virtual machines Authors: Samuel T. King, Peter M. Chen University of Michigan Yi-Min Wang, Chad Verbowski, Helen J.

Slides:



Advertisements
Similar presentations
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
New Direction for Software Protection in Embedded Systems Department of EECS University of Michigan Feb 22, 2007 Kang G. Shin.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Security Issues and Challenges in Cloud Computing
Windows Security and Rootkits Mike Willard January 2007.
Presented by Boris Yurovitsky
Towards Application Security On Untrusted OS
SubVirt: Implementing malware with virtual machines Yi-Min Wang Chad Verbowski Helen J. Wang Jacob R. Lorch Microsoft Research Samuel T. King Peter M.
Operating System Support for Virtual Machines Sam King George Dunlap Peter Chen CoVirt Project, University of Michigan.
Virtual Machine Monitors CSE451 Andrew Whitaker. Hardware Virtualization Running multiple operating systems on a single physical machine Examples:  VMWare,
Virtualization 101.
To run the program: To run the program: You need the OS: You need the OS:
Tanenbaum 8.3 See references
SubVirt: Implementing malware with virtual machines
By, Anish Shanmugasundaram Yashwanth Sainath Jammi.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
1 UCR Firmware Attacks and Security introduction.
A Survey on Virtualization Technologies. Virtualization is “HOT” Microsoft acquires Connectix Corp. EMC acquires VMware Veritas acquires Ejascent IBM,
Virtualization Concepts Presented by: Mariano Diaz.
Operating System Support for Virtual Machines Sam King George Dunlap Peter Chen CoVirt Project, University of Michigan.
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
Virtualization Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation is licensed.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Stealthy Malware Detection Through VMM-based “Out-of-the-Box” Semantic View Reconstruction CCS’07, Alexandria, VA, Oct 29 – Nov 2, 2007 Xuxian Jiang, Xinyuan.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Countering Kernel Rootkits with Lightweight Hook Protection Presented by: Hector M Lugo-Cordero, MS CAP 6135 March 24, 2011.
A Virtual Machine Introspection Based Architecture for Intrusion Detection CS598 STK Presented by Zahid Anwar.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Midterm Meeting Pete Bohman, Adam Kunk, Erik Shaw.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Security Vulnerabilities in A Virtual Environment
Full and Para Virtualization
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Protecting The Kernel Data through Virtualization Technology BY VENKATA SAI PUNDAMALLI id :
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
2.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition System Programs (p73) System programs provide a convenient environment.
CSE 451: Operating Systems Winter 2015 Module 25 Virtual Machine Monitors Mark Zbikowski Allen Center 476 © 2013 Gribble, Lazowska,
VMM Based Rootkit Detection on Android
Information Security - 2
6/13/20161 Operating Systems Design (CS 423) Elsa L Gunter 2112 SC, UIUC Based on slides by Roy Campbell, Sam King,
1 Virtualization "Virtualization software makes it possible to run multiple operating systems and multiple applications on the same server at the same.
Botnets A collection of compromised machines
Virtualization.
Virtual Machine Monitors
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Operating Systems Design (CS 423)
Chapter 1: Introduction
Operating System Structure
Botnets A collection of compromised machines
Chapter 2. Malware Analysis in VMs
Introduction to Operating Systems
OS Virtualization.
Chap 10 Malicious Software.
Virtualization Layer Virtual Hardware Virtual Networking
Virtualization 101.
Virtualization Techniques
Operating System Support for Virtual Machines
A Survey on Virtualization Technologies
Basic Concepts Protection: Security:
Virtual machines benefits
Outline Chapter 2 (cont) OS Design OS structure
Chap 10 Malicious Software.
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Basic Dynamic Analysis VMs and Sandboxes
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Presentation transcript:

SubVirt: Implementing malware with virtual machines Authors: Samuel T. King, Peter M. Chen University of Michigan Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R.Lorch Microsoft Research Publication: Security and Privacy, 2006 IEEE Symposium. Presenter: Radha Maldhure

Goal Attacker run malicious software and avoid detection understand and defend against threat Attacker Defender More control OS Hardware App1App2 Attacker Defender Attacker Defender

VMM Fig: architecture of VMM ( used by VMware and VirtualPC ) VM VM runs guest OS and guest application Host application and host OS provides convenient access to I/O devices and run VM services VMI = set of techniques that enable VM service to understand & modify states\ events in guest

What is the presentation about? Virtual-machine based rootkit (VMBR) – installation – malicious services – maintaining control Defending against VMBR – control below VMBR – control above VMBR

VMBR Hardware Target OS App1App2 VMM Attack system After infection Hardware Target OS App1App2 Before infection Attack system = Attack OS + malware invisible User mode

Installation Gain sufficient privileges Install VMBR’s state on persistent storage Modify system’s boot sequence ( VMBR loads before target OS ) Insert VMBR beneath target OS Manipulate boot sequence Attain privileged level (= modifying boot records) !! Need to be done at final stage of shutdown

Malicious services (MS) There are three types 2.MS observes data from target system e.g. use keystroke loggers to obtain sensitive info like password 3.MS modifies the execution of the target system e.g. delete 1.MS with no communication with target system e.g. phishing web servers

Maintaining Control System powers-up BIOS VMBR state Code VMBR !!! Avoid reboots and shutdowns Handle reboots: restarting the virtual hardware rather than resetting the underlying physical hardware Handle shutdowns: use ACPI sleep states to emulate system shutdown Fig: Booting the System System is compromised

Defense Can see only virtualized state Security Software VMBR Security Software Can see the actual state and state of VMBR

Security Software below VMBR Basic idea: Detector’s view of system does not go through VMBR’s virtualization layer Ways: – Boot from safe medium such as CD-ROM, USB + physically unplug before booting – Use secure VMM

Security Software above VMBR Basic idea: Security Software below VMBR is inconvenient Ways: –Compare running time of software in VM with benchmarks against wall-clock time –Run a program that requires entire memory or disk space

Contribution Explored the design and implementation of VMBR Explored techniques for detecting VMBR

Weakness VMBR is difficult to install VMBR require reboot before they can run Have more impact on the overall system

Suggestions The Ideas suggested by paper is good but needs many implementations both on attacker’s side and defender’s side Defense not convenient for end users Some ideas are not clear

Questions? Quote for the day “No defeat is final until we stop trying”