MAKE DKOM ATTACKS GREAT AGAIN
MARIANO GRAZIANO
Bologna, Italy - 29/10/2016
1
MAKE DKOM ATTACKS GREAT AGAIN MARIANO GRAZIANO Bologna, Italy - - - PowerPoint PPT Presentation
MAKE DKOM ATTACKS GREAT AGAIN MARIANO GRAZIANO Bologna, Italy - 29/10/2016 1 whoami Security researcher at Cisco in the Talos group Ph.D. Telecom ParisTech/Eurecom Hackademic Malware analysis / memory forensics 2 ROOTKIT
MAKE DKOM ATTACKS GREAT AGAIN
MARIANO GRAZIANO
Bologna, Italy - 29/10/2016
1
2
3
4
RING 3 RING 0 RING -1 RING -2 RING -3
PRIVILEGES
5
RING 3 RING 0 RING -1 RING -2 RING -3
PRIVILEGES DETECTION
6
RING 3 RING 0 RING -1 RING -2 RING -3
PRIVILEGES DETECTION COMMON ROOTKITS
7
RING 3 RING 0 RING -1 RING -2 RING -3
PRIVILEGES DETECTION
RING -1
8
RING 3 RING 0 RING -1 RING -2 RING -3
PRIVILEGES DETECTION
Phrack #66 - ’09
RING -2
9
10
RING 3 RING 0 RING -1 RING -2 RING -3
PRIVILEGES DETECTION
RING -3
11
DKOM BOOTKITS ROP ROOTKITS BLUEPILLS FIRMWARE
12
DKOM BOOTKITS ROP ROOTKITS BLUEPILLS FIRMWARE
integrity protection mechanisms” - USENIX Security 09
without Code” - NDSS ‘14
13
14
15
Chuck ROP chains:
16
17
EPROCESS EPROCESS EPROCESS
18
EPROCESS EPROCESS EPROCESS
19
20
21
22
23
24
25
26
27
“Evolutionary Direct Kernel Object Manipulation”
“Subverting Operating System Properties through Evolutionary DKOM Attacks” Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti DIMVA 2016, San Sebastian, Spain
28
29
Data structure of interest Time
30
Violation of a temporal property
31
Violation of a temporal property The attack cannot be detected looking at a single snapshot
in time of a given property and are continuous
32
33
34
target
35
target right-most
36
target right-most Set targetvruntime > rightmostvruntime
37
target target
We affect the evolution of the data structure over time. We altered the scheduler property (fair execution)
38
39
40
41
42
43
44
email: magrazia@cisco.com twitter: @emd3l
45