CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
Virtual Machine Security
CSE443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger
www.cse.psu.edu/~tjaeger/cse443-s12/
1
Virtual Machine Security CSE443 - Spring 2012 Introduction to - - PowerPoint PPT Presentation
Virtual Machine Security CSE443 - Spring 2012 Introduction to Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger 1
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
1
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
2
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
characteristics of computing resources from the way in which
users interact with those resources”
3
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
4
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
5
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
6
Hardware! Host OS! VMM!
Guest OS 1! Guest OS 2! App! App!
Hardware!
Host OS! VMM!
Guest OS 1! Guest OS 2! App! App!
Hardware! VMM!
Guest OS 1! Guest OS 2! App! App!
Type 2 VMM! Type 1 VMM! Hybrid VMM!
JVM! CLR! VMware Workstation! MS Virtual Server! KVM! VMware ESX! Xen! MS Hyper-V!
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
7
Physical Device Controls
Guest OS Guest OS
Partitioned Resources Device Requests
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
8
validation mechanism that satisfies the reference monitor concept!
– A1 level per the Orange Book!
Biba integrity policies (modulo exceptions in “privileges”)!
approximating noninterference!
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
9
the VMs!
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
10
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
11
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
12
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
13
Ultrix OS VMS OS
VMM Security Kernel
VMS OS Applications (Top Secret) Applications (Secret) Applications (Unclassified) Memory Device Disk Device Print Device Display Device
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
14
Guest OS’ Guest OS’
Guest OS’ Guest OS’
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
15
Guest OS’ Guest OS’
Partitioned Resources Device Requests
Host OS’
Drivers
VM Services
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
16
Guest OS’ Guest OS’
Partitioned Resources Device Requests
Host OS’
Drivers
VM Services
Ref Mon
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
17
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
18
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
19
Penn State Systems and Internet Infrastructure Security Lab Page
Application! Application!
System ! Software!
RAM!
Application!
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
20
Penn State Systems and Internet Infrastructure Security Lab Page
Application! Application!
System ! Software!
RAM!
Application!
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
21
Penn State Systems and Internet Infrastructure Security Lab Page
Application! Application!
System ! Software!
RAM!
Application!
MMU! control
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
22
Penn State Systems and Internet Infrastructure Security Lab Page
Application! Application!
System ! Software!
RAM!
Peripheral! Peripheral! Peripheral!
Application!
MMU! control
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
23
Penn State Systems and Internet Infrastructure Security Lab Page
Application! Application!
System ! Software!
RAM!
Peripheral! Peripheral! Peripheral!
Application!
MMU! IOMMU! control
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
24
Penn State Systems and Internet Infrastructure Security Lab Page
VM Guest 3! VM Guest 2!
RAM!
Peripheral! Peripheral! Peripheral!
VM Guest 1!
Process! Process! VM 1!
Hypervisor!
Parent ! VM 0!
control! IOMMU! MMU!
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
25
Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger
26
Page CSE443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger
– Malicious software installed by an attacker on a system – Enable it to run on each boot
– Kernel module, signal handler, ... – When the kernel is booted, the module is installed and intercepts user process requests, interrupts, etc. – E.g., keylogger
– Research project from Michigan and Microsoft – If security service runs in VM, then a rootkit in VMM can evade security – E.g., Can continue to run even if the system appears to be off
27
CSE443 Introduction to Computer (and Network) Security - Spring 2012 - Professor Jaeger
28