CMPS223 Final Project Virtual Machine Introspection Techniques
|
|
|
- Jesse Simpson
- 10 years ago
- Views:
Transcription
1 CMPS223 Final Project Virtual Machine Introspection Techniques Michael Sevilla University of California, Santa Cruz December 4, Introduction This work is a survey of Virtual Machine (VM) introspection, a necessary tool when utilizing VMs for security purposes. In the the rest of this section, we discuss traditional techniques for dealing with malware and the appeals of using a VM in a security context. In Section 2, we outline the main problem for using VMs for security called the semantic gap. In Section 3, we analyze 3 related approaches to VM introspection and focus on their advantages and limitations. In Section 4 we show how to leverage existing tools to implement a small rootkit detector. 1.1 Traditional Intrusion Detection and Malware Analysis Systems Intrusion detection systems (IDSs) monitor the observable properties of a system (state, transitions, I/O) [5] to determine if a system is under attack. [5] classifies the effectiveness of IDSs along two axis - visibility and resilience to attack. A highly visible system easily exposes system state and events - this makes it difficult for malicious software, known as malware, to evade detection. A highly resilient system provides good isolation between the IDS and the attacker so the IDS is less likely to be under attack or compromised. The dominant IDS architectures, host-based intrusion detection systems (HIDS) and network-based intrusion detection systems (NIDS), have severe flaws, as shown in Figure 1. HIDSs operate at either user or kernel space, giving them good visibility because they can report process lists, network connections, files, etc. Unfortunately, HIDSs do not have high resilience because their control and the data structures they rely on can be taken over by an attacker - a compromised IDS is useless. NIDS monitor traffic through the system so they have good resilience to attack since the IDS is isolated 1
2 Visibility Resilience HIDS NIDS VM IDS Figure 1: Comparing the advantages of using a VM IDS over the traditional IDSs. VMs offer large advantages for IDSs because of their visibility into the guest OS state and their resilience to attack. from the untrusted host. Unfortunately, NIDs have poor visibility into the actual host system - they can examine incoming and outgoing packets but they cannot see how they are being used in the system [6]. Malware analysis systems attempt to extract information from the system while malware runs. The goal is to characterize the behavior of the malware in the hopes of detecting and destroying it in the future. Not surprisingly, malware analysis systems have the same requirements as an IDS - they must be resilient to attack and visible to an outside entity [2]. 1.2 The Argument for Virtual Machines Virtual machines have become active platforms for intrusion detection and malware analysis because they offer both visibility and resilience, as noted in Figure 1. Virtual machine systems consist of three parts, as shown in the upper left corner of Figure 2. The first part, the VM, is a duplicate of a physical machine. The second part is the guest operating system (OS), which is simply an OS running inside of a VM. Finally, the virtual machine monitor (VMM) is a thin layer of software that manages VMs. The goal of a VMM is to multiplex physical resources for its VMs and it runs directly on the hardware. In general, VMs and VMMs strive to be efficient, simple, general, and isolated [6, 5, 9]. Up until 2003, VMs had been used for server consolidation, testing/developing OSs, and hardware virtualization [6]. In the context of security, using a VM is appealing because it provides a high degree of a resilience with a moderate amount of visibility. The idea is to move the IDS away from the malware and into the VMM or the host OS. According to [5], a well designed VM system will provide: isolation (i.e. between VMM and VMs) inspection (i.e. access to hardware state 1 ) interposition (i.e. privileged functionality) 1 Hardware state includes, but is not limited to, CPU state (registers), memory, and I/O devices (storage, I/O registers). 2
3 Figure 2: On the left (black screen), we have the guest OS reporting its processes. On the right (white screens), we have the VMM monitor showing the physical memory and CPU usage. Malware, pictured as the red process, can compromise an OS if it penetrates the kernel. A compromised OS can report incorrect state, so we must use the hardware information provided by the VMM to reconstruct high level state. If the system provides these properties, it is easy to offer resilience since the host is isolated from the attacker via the protection domains. Although the visibility is better than a NIDS, it is still NOT good enough to properly implement effective IDSs and malware analysis systems. Work attempting to improve the visibility in a VM system has produced a process called introspection, which, although not perfect, can help improve the visibility of the system. 2 Virtual Machine Introspection To extrapolate the behavior of both the malware and the infected system, a programmer, operating in the context of the host OS, needs to extract state and event information from the guest OS. In other words, the programmer needs to inspect the VM from the outside to analyze the software running on the inside [5]. Unfortunately, a well known problem called the semantic gap makes this process difficult. 2.1 Problem: The Semantic Gap In VM systems, the semantic gap is the information mismatch between the guest OS s high level semantic state and its low level bits [4]. From outside the guest OS, it is difficult to correlate the guest OS s software activity with 3
4 its hardware events. In the correct context, these problems are not difficult. From inside the guest OS, it is trivial to gather information about the guest OS software state by using the guest OS programs and APIs. Similarly, from outside the guest OS, it is simple to efficiently gather information about the hardware state from the VMM [9, 5]. Unfortunately, when VMs are used for security, the guest OS cannot be used to bridge the semantic gap because it may be compromised. Malware that has penetrated the guest OS can alter how it exposes its state, as shown in Figure 2. Therefore, we cannot trust the guest OS programs and APIs so we must get the same functionality outside the VM using the bits representing memory, processor activity, and register values exposed by the VMM [2]. 2.2 What is introspection & how will it help us? Introspection is the process of extracting the guest OS state from outside the VMM [5]. An introspection tool attempts to bridge the gap between the hardware and software layers. Ultimately, this will enable us to analyze malware behavior so that we can reason about ways to detect, prevent, and fix corrupt systems. Introspection has many applications, aside from IDSs and malware analysis. In [9, 2], the authors list applications and research projects with a need for efficient introspection, including trusted computing, policy enforcement, Nettops, virtual distributed monitoring, logging and replay, archiving attacks, forensic analysis, integrity checking, honeypot analysis and VMM sensors. 2.3 Why introspection is difficult Traditional introspection 2 is difficult because most implementations require: extensive knowledge, which reduces generality manual inspection, which increases complexity a high degree of flexibility, which is costly Traditional introspection requires extensive knowledge of the guest OS data structures and behavior. A common technique is to examine physical memory; an introspection tool can walk memory and leverage knowledge of the OS algorithms and data structures to recreate the high level semantic information. Knowledge of the OS can include layout, location of kernel 2 This is a term I use to describe the early VM IDS architectures. These usually date to around 2003, since this is when [5, 6], the pioneering work in VM IDS systems, were published. 4
5 structures, kernel memory layout, and global variable layout. As a result, generality is poor since the introspection tool is tied to the guest OS [2]. This problem is exacerbated if the guest OS is not open-source or if the developers wish to support additional types of VMs and VMMs [3]. Designing a tool that performs manual inspection is especially complex, leading to performance and correctness challenges. Comparing system configurations, locating and using the OS kernel structures, and managing the data slows down the system and makes it difficult to launch these techniques in an online fashion. The complexity also increases the likelihood of buggy introspection behavior since designing manual inspection introspection is tedious and slow. To make things worse, the collection method (i.e. when to snapshot memory) and its frequency can increase the amount of information that needs to be managed and exposed [2]. Finally, flexibility of the tool functionality is desirable - most programmers would like the widest range of reportable information. Unfortunately, the higher the functionality, the higher the cost. 3 Approaches & Achievements The evolution of introspection has had a predictable trajectory. It started with analyzing crash dumps and utilities, which requires debugging with symbols and kernel data structure knowledge [4]. Then modifying the kernel to monitor simple OS constructs, such as system calls [6], became prevalent. As VMMs, like Xen [9] and VMSafe [3] became more sophisticated, they started to offer APIs to easily expose hardware. Today s introspection tools try to automatically and efficiently bridge the gap between high level software and low level hardware events. What follows is an examination of 3 recent papers that aim to further reduce introspection obstacles by collecting and interpreting information automatically. 3.1 Leveraging Digital Forensics Dolan-Gavitt at al. [3] propose using digital forensics to help solve current VM introspection problems. Forensic memory analysis (FMA) aims to answer many of the same questions that plague introspection tools - what happened in the system, what state is the machine in, what transition it is making, etc. To aid the digital forensic programmer, tools have been developed to parse, reconstruct, and re-walk the hidden OS structures in physical memory dumps. [3] notices that FMA tools have already done much of the work to bridge the semantic gap and they conclude that it is foolish to redesign manual inspection tools for introspection since the process is error prone, time-consuming, and tedious. 5
6 FMA tools cannot be used as is because VM security systems need to perform live analysis to implement monitoring techniques that can analyze and detect events as they occur. FMA occurs after a security incident is suspected to have occurred, so there is no notion of snapshotting or incremental updates. If systems snapshot or store data incorrectly, the introspection tool may induce data explosion and poor performance, as was shown in [10]. To use FMA tools for live security analysis, [3] hooked up a FUSE filesystem to the Xen VMM - the memory is dumped to a file and then introspection tools are used to glean important data structures. To show this, they re-implemented VMWall (filters traffic based on application) by utilizing existing capabilities in an open-source FMA framework. The implementation was declared a success, as it detected system call table and IRP hooking. Discussion The authors provide a convincing argument for the effectiveness and practicality of using FMA tools in VM introspection. Using FMA tools prevents developers from wasting time coding redundant functionality and this model, of continually adding to what others have done is a common motif in computer science. The simplicity of the approach allows other facets of computer science to contribute to introspection. For example, deduplication techniques could be applied to memory snapshots so that only differences are saved instead of the entire memory dump. Other computer science fields, like data mining, machine learning, and optimal control, have opportunities for efficiently training these systems instead of requiring knowledge of the OS internal workings. 3.2 Virtuoso Virtuoso [2] is a big extension of [3] and tries to bridge the semantic gap automatically. The authors lament the fact that VM-based intrusion detection, forensic memory analysis, and low artifact analysis all require a detailed knowledge of the guest OS in order to figure out the current state of the guest OS in the VM. They lay out similar arguments to section 3.1 and append the argument that since we are stuck with this process, we should at least make it easier to use. Virtuoso automatically generates host OS programs that extract information from the guest OS. The tool dynamically traces the execution of trusted guest OS programs (training programs), like Linux s ps, and produces python code and data. This code and data is executed by the host OS to get information from an untrusted guest OS. To do this, the authors inserted logging functions into QEMU to spit out instruction traces about the physical memory address and page table 6
7 entries for load and store functions. These instruction traces are analyzed by a trace analyzer, which produces the data and tools. They tested their solution on the basis of generality, reliability, and resilience to attacks aimed at output programs. For generality, they generated 6 training programs for three different OSs and verified that the generated programs were correct by hand. For reliability, they test drove on Windows while tracing pslist and then checked to see if the output was the same as the training program for that image. For resilience, they used a hacker toolkit to hide a process in the OS and determined if it could be detected. The authors concluded that Virtuoso exhibited generality, reliability, resilience, and unsatisfactory performance (not fast enough for live analysis ). Discussion Virtuoso transforms a tedious and time-consuming task into a task for an average programmer but the system raises more questions than answers. limitations: many, like [1], despite system complexity - good tradeoff? scope: trace tools restricted to system call data - too narrow? performance: is slow and ignores training - how is this feasible? dependencies: partitions at kernel/user space - aren t these related? Even the assumption that an average programmer 3 could use this system is doubtful. To navigate Virtuoso, the programmer needs knowledge of the Virtuoso components and the involved VMM, VMs, and OSs. Furthermore, the programmer has to know what he/she wants. A big problem with dealing with malware is that it is stealthy and unpredictable - how can we expect the programmer to know, a priori, which tool to use? 3.3 VM Space Traveler VM Space Traveler (VMST) [4] builds on Virtuoso s promising framework by increasing automation and transparency. The tool automatically bridges the semantic gap to generate VMI tools - there is no need to specify which tools the user wants. While Virtuoso requires a little intervention and tool framework knowledge, VMST automatically generates secure introspection tools with path coverage and higher data capacities. The methodology is far different than Virtuoso because it uses system wide instruction monitoring to redirect important kernel data. The steps are: (1) identify system call execution context, (2) identify redirectable data, and (3) redirect kernel data 3 It is entirely possible that I am not an average programmer. 7
8 Identifying system call execution contexts involves identifying the system call and relevant kernel data. Identifiyng the redirectable data requires figuring out the kernel data that is useful for introspection. Redirecting the relevant kernel data is the final step. This tool must be run in parallel with the in-product VM. The authors concluded that VMST provides functionality, performance, and generality. Experiments show that the tool incurs a 9.3X overhead in the worst case for regular use. Discussion VMST does well to automatically bridge the gap and uses sophisticated user and kernel space techniques to reuse the OS. The idea of redirecting the desired introspection functionality seems like a solid option, especially for liveness and correctness proofs. Although VMST provides small improvements over Virtuoso it s complexity seems to outweigh the advantages. First, it does not seem as transparent as they declare, and the complexity makes extensibility of the code more difficult. For example, extending this to different system-call interfaces and semantics seems daunting. Second, there is little discussion for storing the data - what data structures need to be maintained and managed to support this functionality? The system already seems to have poor performance - wouldn t storing data make this worse? Finally, creating an excessive amount of tools seems time consuming and superfluous - it may not be the case that the administrator wants all these tools - there should be a selectable subset to improve performance and storage overheads. 4 An Implementation: A Return to Leveraging Introspection & FMA Tools Introspection tools are trending towards complexity; in this section we attempt to show how current tools and simple approaches can produce excellent results without extensive knowledge of the system or the tools. In effect, we are trying to shift the focus back to simplicity and leveraging existing tools, like in Section 3.1. We used LibVMI [8], Volatility [11], and KBeast [7] to reveal a hidden process and the accompanying module. LibVMI is a live analysis introspection tool that uses a VMM to read/write memory. We run LibVMI on Xen, with Ubuntu running Linux 3.2 as the guest OS and OpenSuse 12 running Linux 3.4 as the host OS. Volatility is an FMA toolkit that extracts kernel data structures from physical memory (RAM) dumps. KBeast is a stealth rootkit, loaded as a kernel module, which launches a hidden backdoor for remote access. Using system call hooks, KBeast hides files, 8
9 Figure 3: Lists from actual screenshots of a system running our program monitor-vm.sh. The KBeast rootkit (red process), hides a process (pid 1373) and module from the guest OS. monitor-vm.sh combines LibVMI and Volatility and uses their APIs to expose the intruder. processes, sockets, connections, and more. We wrote a small program, called monitor-vm.sh, to detect and alert the user to a hidden module, as shown in Figure 3. The shell script uses Lib- VMI to dump memory to a file. Then it runs the check list modules() Volatility function over the dumped memory. check list modules() uses sysfs, which exports /sys/module information, to determine which modules were removed from the module list but still active [12]. Using this technique, we were also able to identify the hidden process and module with less than 10 lines of code, as shown in Figure Lessons Learned Although their presence in the community (forums and blogs) is strong, these tools are still works-in-progress and setting them up is difficult and time consuming. Xen favors specific distributions (opensuse), LibVMI requires finding kernel struct offsets, and Volatility requires ziping together symbol tables and build libraries. To make matters worse, the tools, especially LibVMI, are not user-friendly and they outputs poor error messages, 9
10 #! / bin / sh while [ 1 ] do / vmitools /dump memory ubuntu12 32 b i t memdump. lime echo Running... date / vol. py f memdump. lime p r o f i l e=ubuntu li nux ch eck modules rm memdump. lime done Figure 4: The source for monitor-vm.sh is only 9 lines long. The script continually dumps memory with LibVMI and checks for hidden modules with Volatility. especially when checking arguments. Used separately, the limitations of these tools are easily exposed. Lib- VMI has tools that examine process lists and loaded modules but they traverse the data structures in the same fashion as the OS. This will produce results that are the same as the guest OS since the faulty structures are being used. As a result, in initial tests with LibVMI and KBeast, we could see the hidden process but not the loaded module. Volatility is not designed for live analysis so dumping memory with its corresponding tool, LiME, is very slow and requires loading a loadable kernel module. The good news, as we showed in this section, is that these tools used in conjunction are extremely powerful. Conclusion In this work, we did an in-depth analysis of current introspection techniques and their tradeoffs. Malware can force a guest OS to report incorrect information so introspection tools were created to help bridge the semantic gap between the high level semantic state in software and the low level bits in hardware. Introspection techniques have trended towards using FMA and automatically creating introspection programs, as shown by Virtuoso and VMST. We noticed that the complexity of these systems has increased yet the use of the systems still required advanced knowledge of the components and the approach. As a result, we implemented a small program that combined an underdeveloped introspection tool (LibVMI) with a sophisticated FMA tool (Volatility). Our tool, called monitor-vm.sh, successfully detected hidden process and modules in a guest OS. 10
11 References [1] S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, and D. Xu. Dksm: Subverting virtual machine introspection for fun and profit. In Proceedings of the th IEEE Symposium on Reliable Distributed Systems, SRDS 10, pages 82 91, Washington, DC, USA, IEEE Computer Society. [2] B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee. Virtuoso: Narrowing the semantic gap in virtual machine introspection. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP 11, pages , Washington, DC, USA, IEEE Computer Society. [3] B. Dolan-Gavitt, B. Payne, and W. Lee. Leveraging forensic tools for virtual machine introspection. Technical Report GT-CS-11-05, Georgia Institute of Technology, [4] Y. Fu and Z. Lin. Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP 12, pages , Washington, DC, USA, IEEE Computer Society. [5] T. Garfinkel, M. Rosenblum, et al. A virtual machine introspection based architecture for intrusion detection. In Proc. Network and Distributed Systems Security Symposium, [6] M. Laureano, C. Maziero, and E. Jamhour. Intrusion detection in virtual machine environments. In Proceedings of the 30th EUROMICRO Conference, EUROMICRO 04, pages , Washington, DC, USA, IEEE Computer Society. [7] Packetstorm. [8] B. Payne. [9] B. D. Payne and W. Lee. Secure and flexible monitoring of virtual machines. In ACSAC, pages , [10] J. Toldinas, D. Rudzika, V. Štuikys, and G. Ziberkas. Rootkit detection experiment within a virtual environment. Electronics and Electrical Engineering Kaunas: Technologija, NA(8):104, [11] Volatility. [12] Volatility, September
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Evasion Resistant Intrusion Detection Framework at Hypervisor Layer in Cloud
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Evasion Resistant Intrusion Detection Framework at Hypervisor Layer in Cloud Bhavesh Borisaniya and Dr. Dhiren Patel NIT Surat,
Run-Time Deep Virtual Machine Introspection & Its Applications
Run-Time Deep Virtual Machine Introspection & Its Applications Jennia Hizver Computer Science Department Stony Brook University, NY, USA Tzi-cker Chiueh Cloud Computing Center Industrial Technology Research
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors Benoit Boissinot E.N.S Lyon directed by Christine Morin IRISA/INRIA Rennes Liviu Iftode Rutgers University Phenix
Analysis of the Linux Audit System 1
Analysis of the Linux Audit System 1 Authors Bruno Morisson, MSc (Royal Holloway, 2014) Stephen Wolthusen, ISG, Royal Holloway Overview Audit mechanisms on an operating system (OS) record relevant system
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing
Lecture and Presentation Topics (tentative) CS 7301: Recent Advances in Cloud Computing Cloud storage systems The rise of big data on cloud computing: Review and open research issues Consistency models
Honeypot-Architectures using VMI Techniques
Honeypot-Architectures using VMI Techniques Stefan Floeren Betreuer: Nadine Herold, Stephan Posselt Seminar Future Internet SS2013 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische
A Virtual Machine Introspection Based Architecture for Intrusion Detection
A Virtual Machine Introspection Based Architecture for Intrusion Detection Tal Garfinkel Mendel Rosenblum {talg,mendel}@cs.stanford.edu Computer Science Department, Stanford University Abstract Today s
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Hypervisor-based Intrusion Detection. Lionel Litty
Hypervisor-based Intrusion Detection by Lionel Litty A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate Department of Computer Science University of Toronto
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
How To Stop A Malicious Process From Running On A Hypervisor
Hypervisor-Based Systems for Malware Detection and Prevention Yoshihiro Oyama ( 大 山 恵 弘 ) The University of Electro-Communications ( 電 気 通 信 大 学 ), Tokyo, Japan This Talk I introduce two hypervisor-based
Exploiting the x86 Architecture to Derive Virtual Machine State Information
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies Exploiting the x86 Architecture to Derive Virtual Machine State Information Jonas Pfoh, Christian Schneider,
Survey on virtual machine security
Survey on virtual machine security Bright Prabahar P Post Graduate Scholar Karunya university Bijolin Edwin E Assistant professor Karunya university Abstract Virtualization takes a major role in cloud
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Introduction of Virtualization Technology to Multi-Process Model Checking
Introduction of Virtualization Technology to Multi-Process Model Checking Watcharin Leungwattanakit [email protected] Masami Hagiya [email protected] Mitsuharu Yamamoto Chiba University
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu Georgia Institute of Technology Annual Computer Security Applications Conference
Security and Integrity of a Distributed File Storage in a Virtual Environment
Security and Integrity of a Distributed File Storage in a Virtual Environment Gaspare Sala 1 Daniele Sgandurra 1 Fabrizio Baiardi 2 1 Department of Computer Science, University of Pisa, Italy 2 Polo G.
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Varshapriya J N Asst. Professor, Dept. of Computer Engineering and IT Veermata Jijabai Technological Institute Mumbai, India
Analytical Survey of Security in Virtualized Environment Nilambari Joshi Dept. of Computer Engineering and IT Veermata Jijabai Technological Institute Mumbai, India Varshapriya J N Asst. Professor, Dept.
Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University
Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
nanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Virtualization for Security
Virtualization for Security t j Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting John Hoopes Technical Editor Aaron Bawcom Paul Kenealy Wesley J. Noonan Craig
Full System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. [email protected] 1 Introduction Automated malware analysis systems (or sandboxes)
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory p.1/11
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory DFRWS 2006: Work in Progress (WIP) Aug 16, 2006 AAron Walters 4TΦ Research Nick L. Petroni Jr. University
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Detecting Computer Worms in the Cloud
Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de
Using a Virtualization Techniques Based Platform for Advanced Studies on Operating Systems
Using a Virtualization Techniques Based Platform for Advanced Studies on Operating Systems Gabriel Rădulescu, Nicolae Paraschiv Abstract The virtualization technology allows several (sometimes critical)
x86 ISA Modifications to support Virtual Machines
x86 ISA Modifications to support Virtual Machines Douglas Beal Ashish Kumar Gupta CSE 548 Project Outline of the talk Review of Virtual Machines What complicates Virtualization Technique for Virtualization
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Abstract. 1. Introduction. 2. Threat Model
Beyond Ring-3: Fine Grained Application Sandboxing Ravi Sahita ([email protected]), Divya Kolar ([email protected]) Communication Technology Lab. Intel Corporation Abstract In the recent years
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service
78 A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service Jung-oh Park Dept. of Information Communications, DONGYANG MIRAE University,
Memory Forensics with Hyper-V Virtual Machines. By: @wyattroersma
Memory Forensics with Hyper-V Virtual Machines By: @wyattroersma Who Am I? Wyatt Roersma NVINT Senior Security Engineer Mad Security DFIR challenge creator The Hacker Academy Content Dev I research for
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
A Proposed Architecture of Intrusion Detection Systems for Internet Banking
A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections Abhinav Srivastava and Jonathon Giffin School of Computer Science Georgia Institute of Technology Attacks Victim System Bot
Hypervisor-Based, Hardware-Assisted System Monitoring
Horst Görtz Institute for IT-Security, Chair for System Security VMRay GmbH Hypervisor-Based, Hardware-Assisted System Monitoring VB2013 October 2-4, 2013 Berlin Carsten Willems, Ralf Hund, Thorsten Holz
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
System Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
COM 444 Cloud Computing
COM 444 Cloud Computing Lec 3: Virtual Machines and Virtualization of Clusters and Datacenters Prof. Dr. Halûk Gümüşkaya [email protected] [email protected] http://www.gumuskaya.com Virtual
DACSA: A Decoupled Architecture for Cloud Security Analysis
DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta, William Enck, Peng Ning NC State Ahmed Azab Samsung Ltd Xialoan Zhang Google Inc Cloud Provider Landscape Cloud Provider Landscape
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
Technische Universität München
Technische Universität München Fakultät für Informatik Forschungs- und Lehreinheit Informatik XX Diplomarbeit in Informatik Thomas Kittel Design and Implementation of a Virtual Machine Introspection based
Virtualization and Cloud Computing
Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
Outline. Introduction. State-of-the-art Forensic Methods. Hardware-based Workload Forensics. Experimental Results. Summary. OS level Hypervisor level
Outline Introduction State-of-the-art Forensic Methods OS level Hypervisor level Hardware-based Workload Forensics Process Reconstruction Experimental Results Setup Result & Overhead Summary 1 Introduction
Virtualization. Introduction to Virtualization Virtual Appliances Benefits to Virtualization Example Virtualization Products
Virtualization Originally prepared by Greg Bosch; last modified April 2012 by B. Davison I. Introduction to Virtualization II. Virtual Appliances III. Benefits to Virtualization IV. Example Virtualization
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Intrusion Detection via Static Analysis
Intrusion Detection via Static Analysis IEEE Symposium on Security & Privacy 01 David Wagner Drew Dean Presented by Yongjian Hu Outline Introduction Motivation Models Trivial model Callgraph model Abstract
October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V
October 2015 Issue No: 1.1 Security Procedures Windows Server 2012 Hyper-V Security Procedures Windows Server 2012 Hyper-V Issue No: 1.1 October 2015 This document describes the manner in which this product
Virtual Hosting & Virtual Machines
& Virtual Machines Coleman Kane [email protected] September 2, 2014 Cyber Defense Overview / Machines 1 / 17 Similar to the network partitioning schemes described previously, there exist a menu of options
Analysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Control your corner of the cloud.
Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
