15
SubVirt: Implementing malware with virtual machines Authors: Samuel T. King, Peter M. Chen University of Michigan Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R.Lorch Microsoft Research Publication: Security and Privacy, 2006 IEEE Symposium. Presenter: Radha Maldhure

SubVirt: Implementing malware with virtual machines

Embed Size (px)

DESCRIPTION

SubVirt: Implementing malware with virtual machines. Authors: Samuel T. King, Peter M. Chen University of Michigan Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R.Lorch Microsoft Research Publication: Security and Privacy, 2006 IEEE Symposium. Presenter: Radha Maldhure. Goal. - PowerPoint PPT Presentation

Citation preview

Page 1: SubVirt: Implementing malware with virtual machines

SubVirt: Implementing malware with virtual machines

Authors: Samuel T. King, Peter M. Chen

University of MichiganYi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R.Lorch

Microsoft Research

Publication: Security and Privacy, 2006 IEEE Symposium.

Presenter: Radha Maldhure

Page 2: SubVirt: Implementing malware with virtual machines

Goal

Attacker run malicious software and avoid detection

understand and defend against threat

Attacker Defender

More control

OS

Hardware

App1 App2

Attacker

Defender

Attacker Defender

Page 3: SubVirt: Implementing malware with virtual machines

VMM

Fig: architecture of VMM ( used by VMware and VirtualPC )

VM

VM runs guest OS and guest application

Host application and host OS provides convenient access to I/O devices and run VM services

VMI = set of techniques that enable VM service to understand & modify states\ events in guest

Page 4: SubVirt: Implementing malware with virtual machines

What is the presentation about?

• Virtual-machine based rootkit (VMBR)– installation– malicious services– maintaining control

• Defending against VMBR– control below VMBR– control above VMBR

Page 5: SubVirt: Implementing malware with virtual machines

VMBR

Hardware

Target OS

App1 App2

VMM

Attacksystem

Afterinfection

Hardware

Target OS

App1 App2

Beforeinfection

Attack system = Attack OS + malware

invisible User mode

Page 6: SubVirt: Implementing malware with virtual machines

Installation

Gain sufficient privileges

Install VMBR’s state on persistent storage

Modify system’s boot sequence ( VMBR loads before target OS )

Insert VMBR beneath target OS

Manipulate boot sequence

Attain privileged level(= modifying boot records)

!! Need to be done at final stage of shutdown

Page 7: SubVirt: Implementing malware with virtual machines

Malicious services (MS)There are three types

2.MS observes data from target system e.g. use keystroke loggers to obtain sensitive info like password

3.MS modifies the execution of the target

system e.g. delete email

1.MS with no communication with target systeme.g. phishing web servers

Page 8: SubVirt: Implementing malware with virtual machines

Maintaining Control

System powers-up

BIOS

VMBR stateCode

VMBR!!! Avoid reboots and shutdowns

Handle reboots: restarting the virtual hardware rather than resetting the underlying physical hardware

Handle shutdowns: use ACPI sleep states to emulate system shutdown

Fig: Booting the System

System is compromised

Page 9: SubVirt: Implementing malware with virtual machines

DefenseCan see only virtualized state

Security Software

VMBR

Security Software

Can see the actual state and state of VMBR

Page 10: SubVirt: Implementing malware with virtual machines

Security Softwarebelow VMBR

Basic idea: Detector’s view of system does not go through

VMBR’s virtualization layer

Ways:– Boot from safe medium such as CD-ROM,

USB + physically unplug before booting– Use secure VMM

Page 11: SubVirt: Implementing malware with virtual machines

Security Softwareabove VMBR

Basic idea: Security Software below VMBR is inconvenient

Ways:– Compare running time of software in VM with

benchmarks against wall-clock time– Run a program that requires entire memory or

disk space

Page 12: SubVirt: Implementing malware with virtual machines

Contribution

• Explored the design and implementation of VMBR

• Explored techniques for detecting VMBR

Page 13: SubVirt: Implementing malware with virtual machines

Weakness

• VMBR is difficult to install

• VMBR require reboot before they can run

• Have more impact on the overall system

Page 14: SubVirt: Implementing malware with virtual machines

Suggestions

• The Ideas suggested by paper is good but needs many implementations both on attacker’s side and defender’s side

• Defense not convenient for end users

• Some ideas are not clear

Page 15: SubVirt: Implementing malware with virtual machines

Questions?

Quote for the day

“No defeat is final until we stop trying”