Spectre: A Dependable Introspec3on Framework via System Management Mode
Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou. In DSN'13.
Presented by Fengwei Zhang
Wayne State University CSC 6991 Topics in Computer Security 1
Spectre: A Dependable Introspec3on Framework via System Management - - PowerPoint PPT Presentation
Spectre: A Dependable Introspec3on Framework via System Management Mode Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou. In DSN'13. Presented by Fengwei Zhang Wayne State University CSC 6991 Topics in Computer Security 1 Agenda
Wayne State University CSC 6991 Topics in Computer Security 1
Wayne State University CSC 6991 Topics in Computer Security 2
Wayne State University CSC 6991 Topics in Computer Security 3
Wayne State University CSC 6991 Topics in Computer Security 4
– Large Trusted Compu3ng Base (TCB) (e.g., Xen 4.2 has 208K lines of code) – Armored malware can detect the presence of a VM and alter its own execu3on (e.g., an3-VM techniques) – High performance overhead
Wayne State University CSC 6991 Topics in Computer Security 5
Wayne State University CSC 6991 Topics in Computer Security 6
– Integrity checking: HyperGuard [7], HyperCheck [8], – HyperSentry [1] – SMM rootkits [3, 2] – Agacks against SMM [9]
Wayne State University CSC 6991 Topics in Computer Security 7
Wayne State University CSC 6991 Topics in Computer Security 8
Wayne State University CSC 6991 Topics in Computer Security 9
Target Machine SPECTRE system regularly introspects native memory on target machine Monitor Machine Enter SMM Rebuild semantic data Check kernel code Check kernel data Check program data
Report alerts
select module
‘heartbeat’ attack occured?
Wayne State University CSC 6991 Topics in Computer Security 10
Target Machine SPECTRE system regularly introspects native memory on target machine Monitor Machine Enter SMM
Wayne State University CSC 6991 Topics in Computer Security 11
Target Machine SPECTRE system regularly introspects native memory on target machine Monitor Machine Enter SMM Rebuild semantic data
Wayne State University CSC 6991 Topics in Computer Security 12
Target Machine SPECTRE system regularly introspects native memory on target machine Monitor Machine Enter SMM Rebuild semantic data Check kernel code Check kernel data Check program data
select module
Wayne State University CSC 6991 Topics in Computer Security 13
Target Machine SPECTRE system regularly introspects native memory on target machine Monitor Machine Enter SMM Rebuild semantic data Check kernel code Check kernel data Check program data
Report alerts
select module
‘heartbeat’ attack occured?
Wayne State University CSC 6991 Topics in Computer Security 14
Wayne State University CSC 6991 Topics in Computer Security 15
memory (e.g. OS data structures)
bridging (e.g., Virtuoso [6], VMST [4])
PEB Executive Process Heap List Process Environment Block Heap H0 Heap H1 Heap H2 Heap H3 Heap H4 ... Heap Hn Heap List
Heap H0 Metadata
Segment S0 Segment S1 Segment S2 ... Segment Sn Heap Segment
Segment S0 Metadata... FirstEntry LastEntry
Entry E1 Entry E2 Entry E3 Entry ... Entry En
Data... Data... Data...
Static VA of KPCR 0xffdff000 KPCR KdVersionBlock +34h PsActiveProcessHead prev next +78h Executive Process e.g., “System” prev next Executive Process e.g., “explorer.exe” prev next Executive Process e.g., “lsass.exe” prev next Handle Table 1 Handle Table 2 Handle Table 3 Other Executive Processes Other heap tables ... ...
Wayne State University CSC 6991 Topics in Computer Security 16
Wayne State University CSC 6991 Topics in Computer Security 17
Wayne State University CSC 6991 Topics in Computer Security 18
Wayne State University CSC 6991 Topics in Computer Security 19
Wayne State University CSC 6991 Topics in Computer Security 20
Wayne State University CSC 6991 Topics in Computer Security 21
Wayne State University CSC 6991 Topics in Computer Security 22
Wayne State University CSC 6991 Topics in Computer Security 23
Windows Linux
5s 2s 1s
1 2 s 1 16 s
0% 10% 20% Sampling interval / s Percent overhead Without detection module Heap spray module Heap overflow module Rootkit module 5s 2s 1s
1 2 s 1 16 s
0% 5% 10% 15% 20% Sampling interval / s Percent overhead Without detection module Heap spray detection module Rootkit detection module
Wayne State University CSC 6991 Topics in Computer Security 24
Wayne State University CSC 6991 Topics in Computer Security 25
Wayne State University CSC 6991 Topics in Computer Security 26
Wayne State University CSC 6991 Topics in Computer Security 27
Wayne State University CSC 6991 Topics in Computer Security 28