Presentation is loading. Please wait.

Presentation is loading. Please wait.

The ghost of intrusions past Ashlesha Joshi Peter M. Chen University of Michigan 7 December 2004.

Similar presentations


Presentation on theme: "The ghost of intrusions past Ashlesha Joshi Peter M. Chen University of Michigan 7 December 2004."— Presentation transcript:

1 The ghost of intrusions past Ashlesha Joshi Peter M. Chen University of Michigan 7 December 2004

2 Motivation Red time interval: window of vulnerability during which exploit is possible Prompt patching makes this interval smaller, but cannot eliminate it What to do in what’s left of window of vulnerability? Vulnerability Introduced Vulnerability Discovered time Vulnerability Patched

3 Solution Use VM replay and VM introspection to detect the triggering of a vulnerability As machine replays, examine its state to determine if vulnerability gets triggered Vulnerability Introduced Vulnerability Discovered time Vulnerability Patched

4 Example Consider a race condition: Predicate: (v does not satisfy the condition at line 4) Who writes the predicate? 1 if (variable v does not satisfy condition) 2 return error 3 Do other stuff 4 Use variable v // condition not rechecked

5 Summary and Status Can use same VM introspection technique during live execution, not just replay Already can write and evaluate predicates for kernel bugs Currently extending to work for application bugs too Patch Available time Patch Applied Vulnerability Introduced Vulnerability Discovered


Download ppt "The ghost of intrusions past Ashlesha Joshi Peter M. Chen University of Michigan 7 December 2004."

Similar presentations


Ads by Google