spectre a dependable introspec3on framework via system
play

Spectre: A Dependable Introspec3on Framework via System Management - PowerPoint PPT Presentation

Spectre: A Dependable Introspec3on Framework via System Management Mode Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou. In DSN'13. Presented by Fengwei Zhang Wayne State University CSC 6991 Topics in Computer Security 1 Agenda


  1. Spectre: A Dependable Introspec3on Framework via System Management Mode Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou. In DSN'13. Presented by Fengwei Zhang Wayne State University CSC 6991 Topics in Computer Security 1

  2. Agenda • Introduc3on • Background • System Framework • Experimental Results • Conclusion Wayne State University CSC 6991 Topics in Computer Security 2

  3. Agenda • Introduc3on • Background • System Framework • Experimental Results • Conclusion Wayne State University CSC 6991 Topics in Computer Security 3

  4. Introduc3on • Malware detec3on and analysis remain an open research problem • ︎ Tradi3onally, malware detec3on is provided by installing an3-malware tools (e.g., an3-virus) within the OS • ︎ However, these detec3on tools are vulnerable to malware running at the same level (e.g., rootkits) • ︎ ’Out-of-box’ introspec3on mechanism proposed for malware detec3on and analysis (e.g., Virtual machine introspec3on) Wayne State University CSC 6991 Topics in Computer Security 4

  5. Introduc3on • Virtual Machine Intropsec3on (VMI) systems run malware within a VM and use analysis tool to introspect the malware from outside • ︎ VMI systems have been widely adopted for malware detec3on and analysis. They isolate the malware detec3on so]ware from a vulnerable guest [4, 5, 6] • Limita3ons of VMI systems: – Large Trusted Compu3ng Base (TCB) (e.g., Xen 4.2 has 208K lines of code) – Armored malware can detect the presence of a VM and alter its own execu3on (e.g., an3-VM techniques) – High performance overhead • We present Spectre, a dependable introspec3on framework via system management mode Wayne State University CSC 6991 Topics in Computer Security 5

  6. Agenda • Introduc3on • Background • System Framework • Experimental Results • Conclusion Wayne State University CSC 6991 Topics in Computer Security 6

  7. Background System Management Mode (SMM) • A CPU mode on the x86 Architecture. • A]er entering into SMM, it executes the System Management Interrupt (SMI) handler • SMI handler stores at a sealed storage called System Management RAM (SMRAM) • BIOS locks the SMRAM, and the SMRAM is inaccessible from any other CPU modes • SMM-based systems – Integrity checking: HyperGuard [7], HyperCheck [8], – HyperSentry [1] – SMM rootkits [3, 2] – Agacks against SMM [9] Wayne State University CSC 6991 Topics in Computer Security 7

  8. Background Basic Input and Output System (BIOS) and Coreboot • BIOS code is stored on-vola3le ROM, and it is responsible for hardware ini3aliza3on before OS starts. • Coreboot is an open source project aimed to replace the BIOS in current computer • Spectre uses a custom SMI handler in Coreboot Wayne State University CSC 6991 Topics in Computer Security 8

  9. Agenda • Introduc3on • Background • System Framework • Experimental Results • Conclusion Wayne State University CSC 6991 Topics in Computer Security 9

  10. System Framework Target Machine Monitor S PECTRE system regularly introspects native memory on target machine Machine Check kernel data Rebuild Check kernel code Enter Report alerts semantic SMM Check program data ‘heartbeat’ data attack occured? optional custom module ... select module Wayne State University CSC 6991 Topics in Computer Security 10

  11. System Framework • Step 1: Periodic triggering of SMM Target Machine Monitor S PECTRE system regularly introspects native memory on target machine Machine Enter SMM Wayne State University CSC 6991 Topics in Computer Security 11

  12. System Framework • Step 1: Periodic triggering of SMM • Step 2: Rebuilding seman3c informa3on Target Machine Monitor S PECTRE system regularly introspects native memory on target machine Machine Rebuild Enter semantic SMM data Wayne State University CSC 6991 Topics in Computer Security 12

  13. System Framework • Step 1: Periodic triggering of SMM • Step 2: Rebuilding seman3c informa3on • Step 3: Running a detec3on module Target Machine Monitor S PECTRE system regularly introspects native memory on target machine Machine Check kernel data Rebuild Check kernel code Enter semantic SMM Check program data data optional custom module ... select module Wayne State University CSC 6991 Topics in Computer Security 13

  14. System Framework • Step 1: Periodic triggering of SMM • Step 2: Rebuilding seman3c informa3on • Step 3: Running a detec3on module • Step 4: Communica3on with monitor server Target Machine Monitor S PECTRE system regularly introspects native memory on target machine Machine Check kernel data Rebuild Check kernel code Enter Report alerts semantic SMM Check program data ‘heartbeat’ data attack occured? optional custom module ... select module Wayne State University CSC 6991 Topics in Computer Security 14

  15. Step 1: Periodic Triggering of SMM • Two ways to trigger an SMI – So]ware-based: write to an ACPI port specified by chipsets – Hardware-based: NIC card, keyboard, mouse, and hardware 3mer • Hardware-based method is more reliable than so]ware-based method, so we use a hardware 3mer at southbridge to periodically assert an SMI Wayne State University CSC 6991 Topics in Computer Security 15

  16. Step 2: Rebuilding Seman3c Informa3on SMM only sees the raw memory, and does not know the seman3cs of the • memory (e.g. OS data structures) Similar to the seman3c gap problem in VMI systems • We manually bridge the seman3c gap in our prototype, automa3cally • bridging (e.g., Virtuoso [6], VMST [4]) Heap List Segment Executive Process PsActiveProcessHead Static VA of KPCR Segment S 0 Heap H 0 prev Metadata... +78h Heap H 1 0xffdff000 KPCR KdVersionBlock FirstEntry next +34h Heap H 2 LastEntry Heap H 3 PEB Entry E 1 Heap H 4 Executive Process Executive Process Executive Process e.g., “lsass.exe” e.g., “explorer.exe” e.g., “System” Data... ... Heap H n Entry E 2 Other prev prev prev Executive Data... next next next Processes Heap H 0 Metadata Entry E 3 ... Segment S 0 Entry ... Heap List Segment S 1 Data... Segment S 2 Other heap ... ... Entry E n Handle Table 3 Handle Table 2 Handle Table 1 Segment S n tables Heap Process Environment Block Wayne State University CSC 6991 Topics in Computer Security 16

  17. Seman3c Gap Problem in VMI • SoK: Introspec3ons on Trust and the Seman3c Gap. Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion. In S&P'14. • SMM-based Systems, TrustZone-based Systems, SGX, other hardware isolated execu3on environments (HIEEs) Wayne State University CSC 6991 Topics in Computer Security 17

  18. Step 3: Running a Detec3on Module • We demonstrate the capability of our framework with three memory-based agacks: – Detec3ng heap spray agacks – Detec3ng heap overflow agacks – Detec3ng rootkits • Other checking modules can be extended into Spectre with corresponding detec3on algorithm Wayne State University CSC 6991 Topics in Computer Security 18

  19. Step 4: Communica3on with Monitor Machine • The SMI handler alerts the monitor machine over a serial or Ethernet cable • We port the NIC driver into SMI handler because we do want to trust any code in the OS • ‘Heartbeat’ message can be used to detect denial of service agack • Exit from SMM and resume OS states Wayne State University CSC 6991 Topics in Computer Security 19

  20. Agenda • Introduc3on • Background • System Framework • Experimental Results • Conclusion Wayne State University CSC 6991 Topics in Computer Security 20

  21. Prototype Specifica3on • ︎ Hardware – Motherboard: ASUS-M2V MX SE – CPU: 2.2GHz AMD Sempron LE-1250 – RAM: 2GB Kingston DDR2 – NICs: Integrated NIC and Intel e1000 Gigabit with PCI • ︎ So]ware – BIOS: Coreboot+SeaBIOS – OSes: Linux (Cent OS 5.5) and Windows XP SP3 Wayne State University CSC 6991 Topics in Computer Security 21

  22. Memory Agacks Detec3on • Run various memory agacks, and measure the detec3on 3me in the SMM • Detec3on 3me = Time at SMM exit - Time at SMM enter Wayne State University CSC 6991 Topics in Computer Security 22

  23. System Overhead • Spectre is OS-agnos3c, and can detect memory agacks on both Windows and Linux plaqorms. • Benchmark: PassMark on Windows and UnixBench on Linux • First, we run different detec3on modules, and record their benchmark scores – Without detec3on module – Heap spray detec3on module – Heap Overflow detec3on module – Rootkits detec3on module • Second, we change the SMI triggering rate, and it ranges from 1/16 s to 5s Wayne State University CSC 6991 Topics in Computer Security 23

  24. System Overhead • X-coordinate: Sampling interval ︎ • Y-coordinate: Percent overhead Windows Linux 20% Without detection module Without detection module Heap spray module Heap spray detection module Percent overhead Percent overhead 20% 15% Heap overflow module Rootkit detection module Rootkit module 10% 10% 5% 0% 0% 5 s 2 s 1 s 1 1 5 s 2 s 1 s 1 1 2 s 16 s 2 s 16 s Sampling interval / s Sampling interval / s Wayne State University CSC 6991 Topics in Computer Security 24

  25. Comparison with VMI Systems • Smaller code base–Spectre only trust the BIOS, but VMI systems need to trust hypervisor • More transparent–armored malware with an3-VM techniques cannot detect it • Beger Performance Wayne State University CSC 6991 Topics in Computer Security 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend