Automated Defense from Rootkit Attacks
|
|
|
- Elizabeth Louisa Simmons
- 9 years ago
- Views:
Transcription
1 Automated Defense from Rootkit Attacks Arati Baliga and Liviu Iftode Computer Science Department Rutgers University 110 Frelinghuysen Road, Piscataway, NJ Xiaoxin (Mike) Chen VMware Inc Porter Drive Palo Alto, CA 1
2 About Us Laboratory of Distributed Computing (DISCO Lab) Headed by Prof. Liviu Iftode 10 graduate students Projects Remote Healing Using Backdoors Remote repair/recovery of operating system and application state. Defensive Architectures Automated defense against attacks and intrusions 2
3 Outline Motivation Background Our Approach Prototype Work in Progress Future Work Related Work Conclusion 3
4 Motivation With the increasing attack trends, human response to intrusions is too slow or not possible Software and OS vulnerabilities Fast spreading worms (SQL Slammer) We need systems that can detect intrusions automatically as early as possible and recover 4
5 Outline Motivation Background Our Approach Prototype Work in Progress Future Work Related Work Conclusion 5
6 Viruses and Worms Viruses replicate by modifying a normal program/file with a copy of itself. Execution in the host program/file results in the execution of the virus Usually needs human action to execute infected progam Worms are stand-alone programs that spread through the network by exploiting vulnerabilities in services. 6
7 Rootkits Collection of tools used by the attacker to hold root privileges on the compromised system. Rootkit hiding mechanism: User-level rootkits Replace system binaries like ps and netstat Shared library rootkits Replace shared libraries Kernel-level rootkits Replace entries in system call table Replace entries in interrupt descriptor table Replace kernel/module text. Compromise system integrity 7
8 Stealth Malware Increasing number of virus/worm writers use rootkits to evade detection from anti-virus software. Stealth AOL worm In this talk, we refer to this group of malware that hide using rootkit techniques as stealth malware. 8
9 Intrusion Timeline Happens at time t1 Manifests at time t2 Detected at time t3 Damage done to the system Damage done to the system from t1-t3 needs to be discovered and undone this takes time! Ideally intrusion should be detected at t1(prevention) Easier for known attacks Hard for new/unknown attacks Intrusion Detection Systems Move t3 closer to t2 Recover (undo damage) Can t3 be moved between t1 and t2? 9
10 Intrusion Detection Systems (IDS) Detection methods Signature based detection Misuse detection Anomaly detection Detection Location Host Based IDS Network Based IDS 10
11 IDS Implementation Stand-alone systems: Copilot[Arbaugh et al], Backdoors[Bohra et al] Independent secure device Polling based approaches Does not consume CPU cycles Virtualized Environment [VMI, Mendel et al] Can intercept events in the virtual machine Can interpose/change virtual machine state to perform preventive/healing actions 11
12 Ideal IDS Properties Prevent system from being compromised Detect intrusion asap if prevention is not possible. Once intrusion is detected, recover the system to restore faith in the system. Transparently Reveal to the user the damage that has occurred. Generate an attack profile 12
13 Outline Motivation Background Our Approach Prototype Work in Progress Future Work Related Work Conclusion 13
14 Our Approach Detect malicious process when it performs illegal access to protected zones. Track dependencies between files and processes to undo damage automatically Undo damage 14
15 Protected Zones Fig. 1. Figure shows the protected parts of the memory and filesystem that are shaded in pink. This represents the core of the system, which is always protected. The unshaded portions consist of all other files and running programs, which can be compromised at any time. 15
16 Protected Zones (cont d) Core System Files Normally do not change during the lifetime of the system Examples: ps, ls, netstat, etc. Service Files Can be added by administrator depending on which service needs to be protected. Example: apache binary 16
17 Our Approach Detect malicious process when it performs illegal access to protected zones. Track dependencies between files and processes to undo damage automatically Undo damage 17
18 Track Dependencies Infer dependencies Dependencies between files and processes. Parent-child relationships between processes. Store dependencies Create a tree of dependencies (Dependency tree) Dependency tree is stored in a database. Dependency tree size has to be small enough to provide fast undo. 18
19 Infer Dependencies Get system call data (number, arguments) Page directory base identifies process uniquely cr3 register on the x86 platform File identified by full pathname 19
20 Infer Dependencies (cont d) On fork Child has same <esp,eip> but different cr3 When processes executed from the same program, fork at a given point, all children have same <esp,eip> Ambiguities are resolved using physical page number of stack page Relies on Linux fork copy-on-write semantics Apply dependency rules 20
21 Dependency Tree P2 P1 P3 c F1 P4 c F2 P1 creates P2 P2 exits P1 creates P3 P1 creates P4 P3 creates F1 P4 creates F2 F1 is deleted P4 exits P1 exits 21
22 Dependency Storage Size of the dependency tree created is proportional to the number of new files and processes created on the file system. Storage requirements are modest Dependency rules prune entries that are no longer required The dependency tree lives until system is rebooted 22
23 Our Approach Detect malicious process when it performs illegal access to protected zones. Track dependencies between files and processes to undo damage automatically Undo damage Identify and kill malicious processes using the dependency tree Files not deleted 23
24 Containment Steps Assumes a process resident set that always exists in the system. Refer to dependency tree and locate malicious subtree Kill all possible malicious processes Prevents ill-effects Installation/Existence of backdoors. Keyloggers 24
25 Containment Algorithm P0 P0 in the resident set P2 Malicious write P1 P3 c P4 c F2 Malicious subtree F1 25
26 Outline Motivation Background Our Approach Prototype Work in Progress Future Work Related Work Conclusion 26
27 Paladin Prototype 27
28 System Calls mmap, sockets, named pipes will be added later 28
29 Implementation Details Guest OS must be non-pageable Paladin driver Has knowledge of Guest OS kernel Performs symbol lookup of kernel text and jump tables Also responsible for carrying out undo actions 29
30 Performance Evaluation VMware workstation software Database: MySQL Guest OS and Host OS: Linux 2.4 kernel. System calls System calls Optimized VMM (slow path) (slow path) (Fast path syscalls) Without Paladin With Paladin Kernel Copy 7 mins and 29 secs 8 mins 30 secs 3 mins and 46 secs Compile 53 mins and 3 secs 56 mins and 7 secs 31 mins and 54 secs Kernel 30
31 System Calls Tracked Total system calls v/s system calls processed by Paladin Performance of individual system calls 31
32 Test Cases User level rootkit Ambient Rootkit (ARK) Kernel level rootkit SuckIt Linux Worm Lion 32
33 User-Level Rootkit: Ambient (ARK) /bin/login Point of detection The security framework prevents corruption of all the system tools 33
34 Kernel-Level Rootkit: SuckIt Modifies instructions in sys_call to redirect to it s own system call table. Does not touch original system call table Works even when kernel module support is disabled Provides covert backdoor that is activated on receiving a special packet. The security framework prevents corruption of kernel text and installation of the backdoor. 34
35 Worm: Lion c /bin/mv c /bin/ps Detection point 35
36 Limitations Current implementation does not prevent Corruption of resident processes Overwriting disk blocks. Rootkit attacks that corrupt data without changing any kernel code or tables are not detected Ex: FU rootkit (Next generation rootkits?) 36
37 Outline Motivation Background Our Approach Prototype Work in Progress Future Work Related Work Conclusion 37
38 Work in Progress: Fingerprinting Early attack identification through fingerprint matching Find them before they hide Automated identification of attacker s files 38
39 Fingerprinting Steps Dynamic cloning Spawn a clone upon attack detection Sandboxing Reconfigure network properties Fine-grained monitoring Watch the processes in the malicious subtree Finer control possible. 39
40 Example: ARK Fingerprint Processes: /tmp/ark1.01/ark /bin/rm /sbin/syslogd /bin/cp /usr/sbin/sshd /bin/chmod /bin/cat /bin/hostname /sbin/ifconfig /bin/grep /bin/awk /bin/sed /sbin/modprobe /usr/lib/sendmail /usr/lib/libhesiod.so.0 Files created /dev/capi20.20 /sbin/syslogd /usr/lib/.ark? /bin/login /usr/sbin/sshd /bin/ls /usr/bin/du /bin/ps /usr/bin/pstree /usr/bin/killall /usr/bin/top /bin/netstat /var/run/syslogd.pid /var/spool/clientmqueue/dfj99kxukx /var/spool/clientmqueue/tfj99kxukx /var/spool/clientmqueue/dfj99l0hix /var/spool/clientmqueue/tfj99l0hix /var/spool/clientmqueue/dfj99l0cv /var/spool/clientmqueue/tfj99l0cv /var/spool/clientmqueue/dfj99l0w2m /var/spool/clientmqueue/tfj99l0w2m
41 Future Work Intrusion detection through system call anomalies Generate behavioural profiles using statistical/learning techniques Intrusion detection through network packet monitoring Collaborative detection across VMs Sharing attack fingerprints Cross node detection 41
42 Outline Motivation Background Our Approach Prototype Future Work Related Work Conclusion 42
43 Related Work Model for Intrusion Detection VMI Automated Detection Copilot, Strider Ghostbuster, Tripwire Automated Post-Intrusion Analysis and Repair Repairable File Service Backtracker Automated Online Defense Introvert, Vigilante 43
44 Model for Intrusion Detection VMI Virtual Machine based Introspection (VMI) for Intrusion Detection [NDSS 03] 44
45 Detection Tools available for rootkit detection Kstat, Chkrootkit, St. Michael, Samhain, F-Secure BlackLight, RootkitRevealer, Tripwire, AIDE Copilot Automated detection from an independent PCI device [Security 03] Strider Ghostbuster A cross-view diff-based approach. [DSN 05] 45
46 Post-Intrusion Analysis and Repair Aid to the administrator Fix the filesystem and keep good changes Find how the intrusion happened RFS, Taser Design, Implementation and Evaluation of Repairable File Service [DSN 03] The Taser Intrusion Recovery System [SOSP 05] BackTracker Backtracking Intrusions [SOSP 03] 46
47 Online Defense Provides online defense against intrusions Introvert Detecting Past and Present Intrusions Through Vulnerability-Specific Predicates [SOSP 05] Vigilante Vigilante: End-to End Containment of Internet Worms [SOSP 05] 47
48 Conclusion The steadily increasing rate of attacks and intrusions requires a robust automated solution We have designed an approach that protects the system from rootkit attacks and contains the effects of stealth malware that use rootkits to hide. We developed a prototype that demonstarted our approach that could sucessfully counter a user-level rootkit, a kernel-level rootkit and a worm that used rootkit techniques to hide 48
49 Thank You! This work is supported by NSF CCR #
Automated Containment of Rootkits Attacks
1 Automated Containment of Rootkits Attacks Arati Baliga, Liviu Iftode Department of Computer Science 110 Frelinghuysen Road, Piscataway, NJ Email: {aratib,iftode}@cs.rutgers.edu Xiaoxin Chen VMware Inc
A Virtual Machine Introspection Based Architecture for Intrusion Detection
A Virtual Machine Introspection Based Architecture for Intrusion Detection Tal Garfinkel Mendel Rosenblum {talg,mendel}@cs.stanford.edu Computer Science Department, Stanford University Abstract Today s
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Inside Windows Rootkits
Chris Ries Security Research Engineer VigilantMinds Inc. 4736 Penn Avenue Pittsburgh, PA 15224 [email protected] Introduction Although they have been around for quite some time, rootkits have become
Rootkit: Analysis, Detection and Protection
Rootkit: Analysis, Detection and Protection Igor Neri Sicurezza Informatica Prof. Bistarelli 1/34 Definition of Rootkit A rootkit is malware which consists of a set of programs designed to hide or obscure
Traditional Rootkits Lrk4 & KNARK
Traditional Rootkits Lrk4 & KNARK Based on a paper by John Levine & Julian Grizzard http://users.ece.gatech.edu/~owen/research/conference%20publications/rookit_southeastcon2003.pdf ECE 4883 Internetwork
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors Benoit Boissinot E.N.S Lyon directed by Christine Morin IRISA/INRIA Rennes Liviu Iftode Rutgers University Phenix
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
How To Stop A Malicious Process From Running On A Hypervisor
Hypervisor-Based Systems for Malware Detection and Prevention Yoshihiro Oyama ( 大 山 恵 弘 ) The University of Electro-Communications ( 電 気 通 信 大 学 ), Tokyo, Japan This Talk I introduce two hypervisor-based
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Abstract. 1. Introduction. 2. Threat Model
Beyond Ring-3: Fine Grained Application Sandboxing Ravi Sahita ([email protected]), Divya Kolar ([email protected]) Communication Technology Lab. Intel Corporation Abstract In the recent years
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Run-Time Deep Virtual Machine Introspection & Its Applications
Run-Time Deep Virtual Machine Introspection & Its Applications Jennia Hizver Computer Science Department Stony Brook University, NY, USA Tzi-cker Chiueh Cloud Computing Center Industrial Technology Research
Exploiting the x86 Architecture to Derive Virtual Machine State Information
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies Exploiting the x86 Architecture to Derive Virtual Machine State Information Jonas Pfoh, Christian Schneider,
LSM-based Secure System Monitoring Using Kernel Protection Schemes
LSM-based Secure System Monitoring Using Kernel Protection Schemes Takamasa Isohara, Keisuke Takemori, Yutaka Miyake KDDI R&D Laboratories Saitama, Japan {ta-isohara, takemori, miyake}@kddilabs.jp Ning
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE
VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with
Analysis of the Linux Audit System 1
Analysis of the Linux Audit System 1 Authors Bruno Morisson, MSc (Royal Holloway, 2014) Stephen Wolthusen, ISG, Royal Holloway Overview Audit mechanisms on an operating system (OS) record relevant system
Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs
Security Engineering Part III Network Security Intruders, Malware, Firewalls, and IDSs Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Center of Academic Excellence Cyber Operations Program 2013 Application
Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Transparent Monitoring of a Process Self in a Virtual Environment
Transparent Monitoring of a Process Self in a Virtual Environment PhD Lunchtime Seminar Università di Pisa 24 Giugno 2008 Outline Background Process Self Attacks Against the Self Dynamic and Static Analysis
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions. Todd Schell
Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions Todd Schell [email protected] Director, Product Engineering CoreTrace TM December 2008 Today s Endpoint Control Challenges
Detecting Computer Worms in the Cloud
Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
HONE: Correlating Host activities to Network communications to produce insight
HONE: Correlating Host activities to Network communications to produce insight GLENN A. FINK, PH.D. Senior Scientist, Secure Cyber Systems SEAN STORY, PMP Project Manager, Software Engineering & Architectures
CS161: Operating Systems
CS161: Operating Systems Matt Welsh [email protected] Lecture 2: OS Structure and System Calls February 6, 2007 1 Lecture Overview Protection Boundaries and Privilege Levels What makes the kernel different
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis
Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Virtualization. Explain how today s virtualization movement is actually a reinvention
Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Chapter 15 Operating System Security
Operating Systems: Internals and Design Principles Chapter 15 Operating System Security Eighth Edition By William Stallings System Access Threats System access threats fall into two general categories:
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
Survey on virtual machine security
Survey on virtual machine security Bright Prabahar P Post Graduate Scholar Karunya university Bijolin Edwin E Assistant professor Karunya university Abstract Virtualization takes a major role in cloud
SubVirt: Implementing malware with virtual machines
SubVirt: Implementing malware with virtual machines Samuel T. King Peter M. Chen University of Michigan {kingst,pmchen}@umich.edu Yi-Min Wang Chad Verbowski Helen J. Wang Jacob R. Lorch Microsoft Research
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Secure In-VM Monitoring Using Hardware Virtualization
Secure In-VM Monitoring Using Hardware Virtualization Monirul Sharif Georgia Institute of Technology Atlanta, GA, USA [email protected] Wenke Lee Georgia Institute of Technology Atlanta, GA, USA [email protected]
Securely Isolating Malicious OS Kernel Modules Using Hardware Virtualization Support
Journal of Computational Information Systems 9: 13 (2013) 5403 5410 Available at http://www.jofcis.com Securely Isolating Malicious OS Kernel Modules Using Hardware Virtualization Support Zhixian CHEN
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor
Full System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. [email protected] 1 Introduction Automated malware analysis systems (or sandboxes)
POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS. Rafal Wojtczuk <[email protected]>
POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS Rafal Wojtczuk Agenda About the speaker Types of hypervisors Attack surface Examples of past and
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Detection of virtual machine monitor corruptions
Detection of virtual machine monitor corruptions Benoît Morgan, Eric Alata, Vincent Nicomette LAAS-CNRS - Dependable Computing and Fault Tolerance (TSF) Team Journée SEC 2 - June 30th, 2015 Detection of
6.828 Operating System Engineering: Fall 2003. Quiz II Solutions THIS IS AN OPEN BOOK, OPEN NOTES QUIZ.
Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.828 Operating System Engineering: Fall 2003 Quiz II Solutions All problems are open-ended questions. In
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections Abhinav Srivastava and Jonathon Giffin School of Computer Science Georgia Institute of Technology Attacks Victim System Bot
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities
Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
Virtual Hosting & Virtual Machines
& Virtual Machines Coleman Kane [email protected] September 2, 2014 Cyber Defense Overview / Machines 1 / 17 Similar to the network partitioning schemes described previously, there exist a menu of options
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Virtualization for Security
Virtualization for Security t j Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting John Hoopes Technical Editor Aaron Bawcom Paul Kenealy Wesley J. Noonan Craig
Virtualization Technology. Zhiming Shen
Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Server Forensics: Linux
Server Forensics: Linux Part II.A. Techniques and Tools: Computer Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos Summary } Linux forensics } Overview of Linux (Unix) systems } System subversion
WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli
WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
Linux Kernel Architecture
Linux Kernel Architecture Amir Hossein Payberah [email protected] Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
Management of VMware ESXi. on HP ProLiant Servers
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad
INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
