os sommelier memory only operating system fingerprinting
play

OS-SOMMELIER: Memory-Only Operating System Fingerprinting in the - PowerPoint PPT Presentation

Motivation State-of-the-Art Detailed Design Evaluation Conclusion OS-SOMMELIER: Memory-Only Operating System Fingerprinting in the Cloud Yufei Gu , Yangchun Fu , Aravind Prakash Dr. Zhiqiang Lin , Dr. Heng Yin


  1. Motivation State-of-the-Art Detailed Design Evaluation Conclusion OS-SOMMELIER: Memory-Only Operating System Fingerprinting in the Cloud Yufei Gu † , Yangchun Fu † , Aravind Prakash ‡ Dr. Zhiqiang Lin † , Dr. Heng Yin ‡ † University of Texas at Dallas ‡ Syracuse University October 16 th , 2012

  2. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Outline Motivation 1 State-of-the-Art 2 Detailed Design 3 Evaluation 4 Conclusion 5

  3. Motivation State-of-the-Art Detailed Design Evaluation Conclusion What is OS Fingerprinting

  4. Motivation State-of-the-Art Detailed Design Evaluation Conclusion What is OS Fingerprinting OS Fingerprinting in the Cloud Given a virtual machine (VM) image (or a running instance), precisely infer its specific OS kernel versions

  5. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Why we need OS Fingerprinting in the Cloud

  6. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Why we need OS Fingerprinting in the Cloud Virtual Machine 1 Introspection [Garfinkel and Rosenblum, NDSS’03]

  7. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Why we need OS Fingerprinting in the Cloud Virtual Machine 1 Introspection [Garfinkel and Rosenblum, NDSS’03] Penetration Testing 2

  8. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Why we need OS Fingerprinting in the Cloud Virtual Machine 1 Introspection [Garfinkel and Rosenblum, NDSS’03] Penetration Testing 2 VM Management (Kernel 3 Update)

  9. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Why we need OS Fingerprinting in the Cloud Virtual Machine 1 Introspection [Garfinkel and Rosenblum, NDSS’03] Penetration Testing 2 VM Management (Kernel 3 Update) Memory Forensics 4

  10. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Virtual Machine Introspection (VMI) [Garfinkel and Rosenblum, NDSS’03] A Trusted OS Linux Win ‐ 7 .. Secure ‐ VM Product ‐ VM Product ‐ VM Introspect Virtualization Layer Hardware Layer

  11. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Virtual Machine Introspection (VMI) [Garfinkel and Rosenblum, NDSS’03] Using a trusted, isolated, dedicated VM to monitor other VMs A Trusted OS Linux Win ‐ 7 .. Secure ‐ VM Product ‐ VM Product ‐ VM Introspect Virtualization Layer Hardware Layer

  12. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Virtual Machine Introspection (VMI) [Garfinkel and Rosenblum, NDSS’03] Using a trusted, isolated, dedicated VM to monitor other VMs A Trusted OS Linux Win ‐ 7 .. Binary Code Reuse based VMI Virtuoso [Dolan-Gavitt et al, Secure ‐ VM Product ‐ VM Product ‐ VM Oakland’11] : using trained Introspect existing legacy code to Virtualization Layer perform VMI VM Space Traveler [Fu and Lin, Hardware Layer Oakland’12] : dynamically instrumenting legacy binary code to perform VMI

  13. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Basic Approaches for OS Fingerprinting

  14. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Basic Approaches for OS Fingerprinting NETWORK DISK Virtual Machine Monitor Layer

  15. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Basic Approaches for OS Fingerprinting NETWORK DISK Virtual Machine Monitor Layer Basic Approaches Network 1 File System 2 CPU State 3 Memory 4 Their Combinations 5

  16. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Network-based OS Fingerprinting TCP/ICMP Packet Response Packet

  17. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Network-based OS Fingerprinting Existing Techniques Probing TCP implementations [Comer and Lin, USENIX Summer TCP/ICMP Packet ATC’94] Response Packet Nmap [Fyodor] Xprob2 [Yarochkin, DSN’09] Synscan [Taleck, CanSecWest’04] ...

  18. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Network-based OS Fingerprinting Existing Techniques Probing TCP implementations [Comer and Lin, USENIX Summer TCP/ICMP Packet ATC’94] Response Packet Nmap [Fyodor] Xprob2 [Yarochkin, DSN’09] Synscan [Taleck, CanSecWest’04] ... Limitations Imprecise : not accurate enough, cannot pinpoint minor differences Can be disabled : many modern OSes disable most of the network services as a default security policy

  19. Motivation State-of-the-Art Detailed Design Evaluation Conclusion File-System Based OS Fingerprinting File Distinctive System Files Files

  20. Motivation State-of-the-Art Detailed Design Evaluation Conclusion File-System Based OS Fingerprinting Basic Approach Mount the VM file system File Distinctive System image Files Files Walk through the files in the disk Advantages : Simple, Intuitive, Efficient, and Precise

  21. Motivation State-of-the-Art Detailed Design Evaluation Conclusion File-System Based OS Fingerprinting Basic Approach Mount the VM file system File Distinctive System image Files Files Walk through the files in the disk Advantages : Simple, Intuitive, Efficient, and Precise Limitations File System Encryption Cannot suit for memory forensics applications when only having memory dump

  22. Motivation State-of-the-Art Detailed Design Evaluation Conclusion CPU Register based OS Fingerprinting CS DS ES FS SS ldtr itdr gdtr TR DR

  23. Motivation State-of-the-Art Detailed Design Evaluation Conclusion CPU Register based OS Fingerprinting CS DS ES FS SS ldtr itdr gdtr TR DR

  24. Motivation State-of-the-Art Detailed Design Evaluation Conclusion CPU Register based OS Fingerprinting CS DS ES FS SS Existing Technique UFO: Operating system ldtr itdr gdtr TR DR fingerprinting for virtual machines [Quynh, DEFCON ’10] Advantage: efficient (super fast)

  25. Motivation State-of-the-Art Detailed Design Evaluation Conclusion CPU Register based OS Fingerprinting CS DS ES FS SS Existing Technique UFO: Operating system ldtr itdr gdtr TR DR fingerprinting for virtual machines [Quynh, DEFCON ’10] Advantage: efficient (super fast) Limitations Imprecise : not accurate enough. WinXP (SP2) vs WinXP (SP3) Cannot suit for memory forensics applications when only having memory dump

  26. Motivation State-of-the-Art Detailed Design Evaluation Conclusion CPU and Memory Combination based OS Fingerprinting Interrupt Handler IDT

  27. Motivation State-of-the-Art Detailed Design Evaluation Conclusion CPU and Memory Combination based OS Fingerprinting Existing Techniques Interrupt Handler Using IDT pointer to retrieve interrupt handler code, and IDT hash these code to fingerprint guest VM [Christodorescu et al, CCSW’09]

  28. Motivation State-of-the-Art Detailed Design Evaluation Conclusion CPU and Memory Combination based OS Fingerprinting Existing Techniques Interrupt Handler Using IDT pointer to retrieve interrupt handler code, and IDT hash these code to fingerprint guest VM [Christodorescu et al, CCSW’09] Limitations Imprecise : not accurate enough, cannot pinpoint minor differences Cannot suit for memory forensics applications when only having memory dump

  29. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Memory-Only Approach for OS Fingerprinting task 0 12 4 8 thread mm signal task 0 0 4 0 task

  30. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Memory-Only Approach for OS Fingerprinting task 0 12 4 8 thread mm signal task Existing Technique SigGraph: Brute Force 0 0 4 0 task Scanning of Kernel Data Structure Instances Using Graph-based Signatures [Lin et al, NDSS’11]

  31. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Memory-Only Approach for OS Fingerprinting task 0 12 4 8 thread mm signal task Existing Technique SigGraph: Brute Force 0 0 4 0 task Scanning of Kernel Data Structure Instances Using Graph-based Signatures [Lin et al, NDSS’11] Limitations Inefficient : a few minutes Requires kernel data structure definitions

  32. Motivation State-of-the-Art Detailed Design Evaluation Conclusion OS-Sommelier: Memory-Only OS Fingerprinting Goal Precise : can pinpoint even minor OS differences Efficient : in a few seconds Robust : hard to evade, security perspective

  33. Motivation State-of-the-Art Detailed Design Evaluation Conclusion OS-Sommelier: Memory-Only OS Fingerprinting Goal Precise : can pinpoint even minor OS differences Efficient : in a few seconds Robust : hard to evade, security perspective Key Idea Compute the hash values of core kernel code in the physical memory for the precise fingerprinting.

  34. Motivation State-of-the-Art Detailed Design Evaluation Conclusion Some Statistics on Core Kernel Page 1400 1200 1000 800 600 400 200 0

  35. Motivation State-of-the-Art Detailed Design Evaluation Conclusion OS-Sommelier: Challenges Challenges How to get a robust and generic way to identify the kernel page table (when only having memory dump)? To traverse memories, We need PGDs to do virtual-to-physical address translation.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend