Software Security
VMI (Virtual Machine Introspection) / VMM-based Intrusion Prevention Julian Vetter
- Prof. Jean-Pierre Seifert
Security in Telecommunications TU Berlin
SoSe 2016
julian (sect) Software Security SoSe 2016 1 / 21
Software Security VMI (Virtual Machine Introspection) / VMM-based - - PowerPoint PPT Presentation
Software Security VMI (Virtual Machine Introspection) / VMM-based Intrusion Prevention Julian Vetter Prof. Jean-Pierre Seifert Security in Telecommunications TU Berlin SoSe 2016 julian (sect) Software Security SoSe 2016 1 / 21
julian (sect) Software Security SoSe 2016 1 / 21
julian (sect) Software Security SoSe 2016 2 / 21
julian (sect) Software Security SoSe 2016 3 / 21
julian (sect) Software Security SoSe 2016 4 / 21
Name Comment Arch. Module Module
Use raw Process Syscall table Loading hiding manipulation socket hiding manipulation Cloaker (POC)
ARM X knark (*)
x86 X X X X
Phrack rootkit I (*)
x86 X Phrack rootkit II (*)
ARM X X Suterusu (*)
ARM X X X X
x86
x86 64 XOR.DDoS
ARM X X X X
x86 x86 64
julian (sect) Software Security SoSe 2016 5 / 21
julian (sect) Software Security SoSe 2016 6 / 21
julian (sect) Software Security SoSe 2016 7 / 21
julian (sect) Software Security SoSe 2016 8 / 21
unsigned long ∗ f i n d s y s c a l l t a b l e ( void ) { void ∗ s w i a d d r = ( long ∗)0 x f f f f 0 0 0 8 ; unsigned long
∗ v e c t o r s w i a d d r ;
∗) s w i a d d r ) & 0 x f f f ) + 8; v e c t o r s w i a d d r = ∗( unsigned long ∗∗)( s w i a d d r + o f f s e t ) ; w h i l e ( v e c t o r s w i a d d r++) { i f ( ((∗( unsigned long ∗) v e c t o r s w i a d d r ) & 0 x f f f f f 0 0 0 ) == 0 xe28f8000 ) {
long ∗) v e c t o r s w i a d d r ) & 0 x f f f ) + 8 ; r e t u r n v e c t o r s w i a d d r + o f f s e t ; } } r e t u r n NULL ; } julian (sect) Software Security SoSe 2016 9 / 21
julian (sect) Software Security SoSe 2016 10 / 21
julian (sect) Software Security SoSe 2016 11 / 21
julian (sect) Software Security SoSe 2016 12 / 21
julian (sect) Software Security SoSe 2016 13 / 21
julian (sect) Software Security SoSe 2016 14 / 21
julian (sect) Software Security SoSe 2016 15 / 21
julian (sect) Software Security SoSe 2016 16 / 21
julian (sect) Software Security SoSe 2016 17 / 21
julian (sect) Software Security SoSe 2016 18 / 21
julian (sect) Software Security SoSe 2016 19 / 21
julian (sect) Software Security SoSe 2016 20 / 21
julian (sect) Software Security SoSe 2016 21 / 21