subverting operating system properties through
play

Subverting Operating System Properties through Evolutionary DKOM - PowerPoint PPT Presentation

Subverting Operating System Properties through Evolutionary DKOM Attacks Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti Cisco Systems, Inc. Universita degli Studi di


  1. Subverting Operating System Properties through Evolutionary DKOM Attacks Mariano ¡Graziano, ¡Lorenzo ¡Flore, ¡Andrea ¡Lanzi, ¡Davide ¡Balzarotti ¡ Cisco ¡Systems, ¡Inc. ¡ Universita’ ¡degli ¡Studi ¡di ¡Milano ¡ Eurecom ¡ DIMVA ¡2016 ¡-­‑ ¡San ¡Sebastian, ¡Spain ¡

  2. TRADITIONAL DKOM ATTACKS EPROCESS EPROCESS EPROCESS

  3. TRADITIONAL DKOM ATTACKS EPROCESS EPROCESS EPROCESS

  4. TRADITIONAL DKOM DEFENSES ‣ Kernel data integrity solutions: ‣ invariants ‣ external systems ‣ memory analysis ‣ data partitioning

  5. EVOLUTIONARY DKOM ATTACKS data structure of interest Time

  6. EVOLUTIONARY DKOM ATTACKS Violation of a temporal property

  7. EVOLUTIONARY DKOM ATTACKS Violation of a temporal property the attack cannot b e d e t e c t e d looking at a single snapshot

  8. STATE VS PROPERTY Traditional DKOM affects the state and are ‣ discrete ‣ Evolutionary DKOM (E-DKOM) affects the evolution in time of a given property and are continuous

  9. THREAT MODEL ‣ Attacker has access to ring0 ‣ Malicious code not detectable by current solutions ‣ Attacker cannot modify kernel code and attack the VMM

  10. EXAMPLE: LINUX CFS SCHEDULER

  11. SUBVERTING THE SCHEDULER target

  12. SUBVERTING THE SCHEDULER target right most

  13. SUBVERTING THE SCHEDULER Set ¡target vruntime ¡ > ¡rightmost vruntime ¡ target right most

  14. SUBVERTING THE SCHEDULER We affected the evolution of the data structure over time. We altered the scheduler property (fair execution). target target

  15. ATTACK EVALUATION ‣ Temporarily block an IDS or Antivirus ‣ Temporarily block Inotify

  16. DEFENSES? ‣ Reference monitor that mimics the OS property: ‣ OS specific ‣ Difficult to generalize

  17. DEFENSE FRAMEWORK

  18. DEFENSE FRAMEWORK

  19. DEFENSE FRAMEWORK

  20. OVERHEAD Normal ¡operations Stress ¡test

  21. CONCLUSIONS ‣ New DKOM attack based on data structures evolution ‣ Experiment on the Linux CFS scheduler ‣ Defense solution based on hypervisor ‣ General mitigation/solution very hard

  22. QUESTIONS? Mariano Graziano magrazia@cisco.com @emd3l

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend