Kernel Exploitation and Hardening Why we could have nice things! (using Split Kernel)
September 2016 – BalCCon 2k16
Anil Kurmus kur@zurich.ibm.com IBM Research - Zurich Outline 1. - - PowerPoint PPT Presentation
September 2016 BalCCon 2k16 Kernel Exploitation and Hardening Why we could have nice things! (using Split Kernel) Anil Kurmus kur@zurich.ibm.com IBM Research - Zurich Outline 1. Background Hardening Kernel Vulnerabilities Kernel
September 2016 – BalCCon 2k16
2
3
4
5
6
7
8
9
10
The Great Seal Bug
11
12
13
14
15
16
17
18
Kurmus & Zippel, ACM CCS'14 http://static.securegoose.org/papers/ccs14.pdf
19
20
21
22
Goal: no overhead
23
sys_read: … call do_read read() do_read: … %rax = @vfs_read call *%rax
compare branch
24
25
26
Goal: remain in hardened mode
27
28
sys_read__hdn: … call do_read__hdn read() do_read__hdn: … %rax = @vfs_read %rax = *(%rax-8) call *%rax @vfs_read__hdn vfs_read: …
29
30
31
32
33
34
35
36
37
38
39