Subverting the Xen hypervisor
|
|
|
- Clara Gwenda Rodgers
- 10 years ago
- Views:
Transcription
1 Subverting the Xen hypervisor Rafał Wojtczuk Invisible Things Lab Black Hat USA 2008, August 7th, Las Vegas, NV
2 Xen 0wning Trilogy Part One
3 Known virtulizationbased rootkits Bluepill and Vitriol They install a malicious hypervisor in run-time... On a system where no hypervisor is present What if there is a legal hypervisor already running?
4 Subverting a legal hypervisor Many analysts predict that in near future, many systems will run some sort of hypervisor by default If we modify the code or data structures of a legal hypervisor, we may achieve capabilities similar to the ones available for Bluepill or Vitriol (stealth!)
5 Challenges The legal hypervisor can protect itself against runtime modification, even if the attacker has all privileges in the management OS. It may be nontrivial to reliably integrate the backdoor code with the legal hypervisor
6 Opportunities No need to hide the mere presence of a malicious hypervisor As the side-effects of its presence can be attributed to the legal hypervisor A lot of required functionality is already implemented in the legal hypervisor Particularly, protection of the hypervisor code from the underlying VMs
7 Subverting Xen 3.x We will discuss: how Xen 3.x hypervisor code or data (on x86_32 or x86_64) can be modified in runtime to allow for backdoor functionality The implementation of a framework allowing to load compiled C code into the hypervisor The implementation of two backdoors
8 Xen architecture
9 Xen architecture, cntd Only Xen code runs in ring 0 Directly loaded by a bootloader All administrative actions are done in a selected VM (dom0) We would like to have backdoor access to dom0 Dom0 is under full control of the hypervisor
10 Xen architecture, cntd Dom0 has direct access to most of the hardware So that device drivers written for dom0 s OS (usually Linux) can be used Paravirtualization vs full virtualization Dom0 is a paravirtualized domain
11 Xen hypercalls Reminder: on Linux, system calls are reachable from usermode by invoking int 0x80; the handler for this interrupt invokes the appropriate system call Similarly, on Xen, hypercalls are reachable from the guest by int 0x82 Examples: do_mmu_update, do_set_gdt
12 Getting control over Xen We assume attacker has root in dom0 and wants to install a stealth backdoor There were vulnerabilities related to pygrub allowing to escape from domu to dom0 (CVE , CVE ) Still, there is no supported method for dom0 to alter Xen s memory Rebooting into modified Xen is noisy
13 Papers by Luic Duflot Pacsec2007: Programmed I/O accesses: a threat to Virtual Machines? Abuses GART and USB subsystem in order to overwrite arbitrary phys memory Cansecwest 2006: Security Issues Related to Pentium System Management Mode SMM memory is locked nowadays...
14 How to abuse DMA Any DMA-capable device can access arbitrary physical memory Including Xen s code Dom0 can setup DMA! domu can be allowed to access some hw Can we conveniently setup an arbitrary DMA transfer with a device used by OS, not disturbing normal operation?
15 Mitigation AMD s IOMMU and Intel s VT-d can restrict the range of addresses that a DMA device can access Not many chipsets support it today This presentation stresses the importance of these mechanisms...but in the next talk we will show the ways to modify Xen, regardless of VT-d...
16 DMA with a NIC Loopback mode of NIC allows to copy data between two locations in RAM It will disconnect us from the net for a fraction of second; blame ISP We will load a modified NIC driver that will reuse data structures of the original driver (as we can t unload the original) Still, we need to modify each NIC driver
17 NIC DMA diagram
18 Tg3dma demo
19 Abusing HDD controller All tested HDD controllers called dma_map_sg() in order to retrieve a suitable bus address for a transfer Thus, we can use _any_ controller, without modifying it: just change the behavior of dma_map_sg()
20 Normal HDD operation
21 Hijacked dma_map_sg
22 When to cheat in dma_map_sg hook? We cannot pass Xen_A for all HDD operations fs or kernel corruption Let usermode call write(somefd, somebuffer, length); will the dma_map_sg() parameters correspond to somebuffer address? Yes, but only in O_DIRECT mode; otherwise, filesystems cache pages will interfere
23 Getting ring0 without DMA Even if we have IOMMU or VT-d (configured properly), there may be bugs in Xen code: Buffer overflow (or similar) Logic error in crucial code paths, e.g. In memory management So the following slides are relevant
24 Xen memory layout What to overwrite with DMA? Xen is loaded at physical address 0x by the bootloader On x86_32, substract 0xff from the virtual address of a Xen function/structure to get its phys address
25 Important Xen functions Hypercalls: stored in hypercall_table array Exception handlers: stored in exception_table Printk, copy_from_user, xmalloc We can get their virtual addresses from xensyms file; if the latter is not available, we need some simple RE
26 What to overwrite? We will overwrite (with DMA) the body of do_ni_hypercall with call first_argument assembly instruction Normally, do_ni_hypercall consists of return ENOSYS, it is unused Then if we invoke hypercall no 11 with the first parameter X, the code at X will be executed in ring 0; int run0(void *fun)
27 Xen loadable modules Xenload tool allows to load a relocatable ELF object (module.o) into Xen; the algorithm: Link module.o with xenlib.o to module.xko Allocate space on Xen s heap via run0(xmalloc) Copy module.xko via run0(memcpy) Run0(init_module); DEMO
28 Xen backdoors design When idle, it must not modify anything in dom0... So that a /dev/mem scanner running in dom0 cannot detect it Arbitrary shell commands execution in dom0 when a magic network packet is seen The executed shell commands are not hidden (more on this later)
29 Debug register backdoor Dr backdoor sets dr3 and dr7 registers so that when dom0 executes netif_rx(), debug exception is raised When the (replaced) debug exception handler sees exception from eip=netif_rx, it scans the packet payload for the presence of magic pattern; if found, execute shell with parameters taken from the payload Dom0 can t see the changed debug regs
30 Dr backdoor, cntd The fault to Xen happens very low in the network stack, before the firewall sees the packet The magic packet is never delivered to dom0
31 Dr backdoor, cntd Dr3 and dr7 are set: During inter-vm context switch to dom0 In do_set_debugreg hypercall, when dom0 sets the relevant dr7 bits to 0 (indicating it does not use dr3) Dr3 and dr7 are unset (released for dom0 use) in do_set_debugreg hypercall when dom0 wants to use dr3
32 Dr backdoor, cntd When dom0 queries dr value via do_get_debugreg hypercall, it is given fake shadow values Unfortunately, due to the lazy handling of dr assignments by Linux kernel, dr3 may remain set (in-use by dom0) even when the debugged process has exited
33 Dr backdoor, cntd When magic packet is seen, the exception handler copies trampoline code to a preallocated page in dom0 and transfers control there The trampoline forks a shell by calling call_usermodehelper_keys() and then selfdestructs by returning into memset
34 Dr backdoor demo
35 Dr backdoor detection When idle, it cannot be detected by memory scan Perhaps the debug regs handling is not entirely transparent But the main problem is the timing analysis; the first instruction of netif_rx() takes too much time to execute! If the NIC drivers were in Xen space...
36 Foreign backdoor Dr backdoor hooks a function in dom0 and thus is subject to timing analysis We need other method to inspect dom0 s state Solution: instead of hooking, scan periodically The magic condition must last longer than the scan interval
37 Foreign backdoor, cntd Xen provides API for a domain to map pages from other domain Only dom0 is allowed to do this We will start a lurker domain and make it privileged (by altering Xen structures) When the lurker sees a magic condition, it will spawn a shell in dom0
38 Foreign backdoor, cntd Currently the magic condition is: an sshd process in dom0 received a magic identification string When it happens, the lurker domain will overwrite sshd stack and saved registers in the kernel stack so that shell is executed What if dom0 is firewalled? No big deal.
39 Foreign backdoor, cntd Xen offers API to Retrieve cr3 of a target domain Map a page by its physical address Libxenctrl library combines the two to produce kernel virtual address resolution Xenaccess project can resolve userland virtual addresses as well; but due to some problems we don t use it (and had to recode this functionality)
40 Foreign backdoor, cntd Opensshd reads ident into a stack buffer for (i=0; i<bufsize; i++) read(sock_in, &buf[i], 1)... if (buf[i]== \n ) break So when the whole ident string has been received, sshd sleeps in the read syscall, with the count parameter being 1, and the buffer parameter pointing just after the received
41
42 Foreign backdoor, cntd How to change the sshd process into shell? We can set eip (on the kernel stack), we can set the stack content, any problem? NX+ASLR (present on modern Linux distributions) is a problem Solution used: transit through sys_sigreturn and sys_mprotect to make the stack executable; we need no offsets!
43 Foreign backdoor demo
44 Foreign backdoor, detection This time, timing analysis will not help, as the backdoor executes in time slices devoted for other domains The lurker domain can be hidden More work on this is needed, the domlist loadable module is a good start Still, all information comes from the hypervisor, so we can filter it
45 IPfrag backdoor Executes during inter-vm context switch, in Xen address space So no need for a separate domain Walks the ipq_hash kernel table to locate all IP fragments received so far; scans them for a magic pattern Spoofed source IP may evade firewall No need to resolve userland addresses
46 IPfrag backdoor, cntd Note: foreign backdoor, if using legal domain, can leave Xen code intact Show me the code! Not yet; there are significant implementation differences in IP fragments handling between Linux kernel versions Ipq_hash is not exported in kallsyms, need a reliable way to find it
47 More on stealth The processes executed by the described backdoors are well-visible We could hook int 0x80 handler to provide system calls filtering But it will fool only dom0 userland, not the kernel So not implemented at all
48 More on stealth, cntd Instead of executing a separate process, we could force some kernel thread (e.g. khelper) or any other existing process to do the desired action, maybe setup syscall proxy Better, but still visible from dom0 kernel
49 More on stealth, cntd The only really stealth operation is viewing of the domain memory Maybe writing as well, in some cases If we want a backdoor capable of silently extracting e.g. crypto keys from some dom0 process, it can be done It can phone home by many means; for example, by altering contents of fragmented ICMP echo requests
50 Thank you! Xen 0wning Trilogy to be continued in: Preventing and Detecting the Xen Hypervisor Subversions (after the lunch) by Invisible Things Lab
51 Bibliography Joanna Rutkowska, Subverting VistaTM Kernel for Fun and Profit, Dino Dai Zovi, Hardware Virtualization Rootkits, VMware Server, CVE , name=cve Multiple integer overflows in e2fsprogs (Xen related), AMD, AMD IOMMU specification 1.2, content\_type/white\_papers\_and\_tech\_docs/34434.pdf
52 Bibliography cntd CVE , name=cve Multiple integer overflows in e2fsprogs (Xen related), AMD, AMD IOMMU specification 1.2, content\_type/white\_papers\_and\_tech\_docs/34434.pdf Intel,Intel Virtualization Technology for Directed I/O (Intel VT-d), \_0507+rhc\_vtd
53 Bibliography cntd Luic Duflot, Programmed I/O accesses: a threat to Virtual Machines?, htttp:// Luic Duflot, Security Issues Related to Pentium System Management Mode, [email protected], Mistifying the debugger, ultimate stealthness, XenAccess Library,
Bluepilling the Xen Hypervisor
Bluepilling the Xen Hypervisor Joanna Rutkowska & Alexander Tereshkin Invisible Things Lab Black Hat USA 2008, August 7th, Las Vegas, NV Xen 0wning Trilogy Part Three Previously on Xen 0wning Trilogy...
POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS. Rafal Wojtczuk <[email protected]>
POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS Rafal Wojtczuk Agenda About the speaker Types of hypervisors Attack surface Examples of past and
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research Agenda Hypervisor based isolation Firmware rootkit
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor
matasano Hardware Virtualization Rootkits Dino A. Dai Zovi
Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
Virtualization Technology. Zhiming Shen
Virtualization Technology Zhiming Shen Virtualization: rejuvenation 1960 s: first track of virtualization Time and resource sharing on expensive mainframes IBM VM/370 Late 1970 s and early 1980 s: became
Securing Your Cloud with Xen Project s Advanced Security Features
Securing Your Cloud with Xen Project s Advanced Security Features Russell Pavlicek, Xen Project Evangelist CloudOpen North America 2013 Who is the Old, Fat Geek Up Front? Xen Project Evangelist Employed
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Virtual machines and operating systems
V i r t u a l m a c h i n e s a n d o p e r a t i n g s y s t e m s Virtual machines and operating systems Krzysztof Lichota [email protected] A g e n d a Virtual machines and operating systems interactions
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Introducing Ring -3 Rootkits
Introducing Ring -3 Rootkits Alexander Tereshkin and Rafal Wojtczuk Black Hat USA, July 29 2009 Las Vegas, NV 1 Introducing Ring -3 2 Getting there 3 Writing useful Ring -3 rootkits A Quest to Ring -3
Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361
s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines
KVM: A Hypervisor for All Seasons. Avi Kivity [email protected]
KVM: A Hypervisor for All Seasons Avi Kivity [email protected] November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Security Challenges in Virtualized Environments
Security Challenges in Virtualized Environments Joanna Rutkowska, Invisible Things Lab Confidence 2008, Krakow, Poland, May 15th, 2008 1 Virtualization-based MALWARE 2 Using Virtual Machines for ISOLATION
Attacking Intel Trusted Execution Technology
Attacking Intel Trusted Execution Technology Rafal Wojtczuk [email protected] Joanna Rutkowska [email protected] ---===[ Invisible Things Lab ]===--- Abstract In this paper we present
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones ([email protected]) May 2011
Cloud^H^H^H^H^H Virtualization Technology Andrew Jones ([email protected]) May 2011 Outline Promise to not use the word Cloud again...but still give a couple use cases for Virtualization Emulation it's
How To Make A Minecraft Iommus Work On A Linux Kernel (Virtual) With A Virtual Machine (Virtual Machine) And A Powerpoint (Virtual Powerpoint) (Virtual Memory) (Iommu) (Vm) (
Operating System and Hypervisor Support for IOMMUs Muli Ben-Yehuda IBM Haifa Research Lab [email protected] p. 1/3 Table of Contents The what and why of IOMMUs. How much does it cost? What can we do about
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
KVM Security Comparison
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-349-7525 Fax: 512-349-7933 www.atsec.com KVM Security Comparison a t s e c i n f o r m a t i o n s e c u
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors
Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors Benoit Boissinot E.N.S Lyon directed by Christine Morin IRISA/INRIA Rennes Liviu Iftode Rutgers University Phenix
An Implementation Of Multiprocessor Linux
An Implementation Of Multiprocessor Linux This document describes the implementation of a simple SMP Linux kernel extension and how to use this to develop SMP Linux kernels for architectures other than
Using Linux as Hypervisor with KVM
Using Linux as Hypervisor with KVM Qumranet Inc. Andrea Arcangeli [email protected] (some slides from Avi Kivity) CERN - Geneve 15 Sep 2008 Agenda Overview/feature list KVM design vs other virtualization
Operating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Red Hat Linux Internals
Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing
Guardian: Hypervisor as Security Foothold for Personal Computers
Guardian: Hypervisor as Security Foothold for Personal Computers Yueqiang Cheng, Xuhua Ding Singapore Management University (SMU) The International Conference on Trust & Trustworthy Computing (TRUST),
Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:
Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between
kvm: Kernel-based Virtual Machine for Linux
kvm: Kernel-based Virtual Machine for Linux 1 Company Overview Founded 2005 A Delaware corporation Locations US Office Santa Clara, CA R&D - Netanya/Poleg Funding Expertise in enterprise infrastructure
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
Xen and the Art of Virtualization
Xen and the Art of Virtualization Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauery, Ian Pratt, Andrew Warfield University of Cambridge Computer Laboratory, SOSP
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Cloud Computing CS 15-319
Cloud Computing CS 15-319 Virtualization Case Studies : Xen and VMware Lecture 20 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Resource Virtualization Today s session Virtualization
Using IOMMUs for Virtualization in Linux
Using IOMMUs for Virtualization in Linux and Xen Muli Ben Yahuda, Jon Mason, Orran Krieger, Jimi Xenidis, Leendert Van Dorn, Asit Mallick, Jun Nakajima, Elsia Wahlig [email protected] Where in the world
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
Clouds, Virtualization and Security or Look Out Below
Clouds, Virtualization and Security or Look Out Below Lee Badger Hardware Virtualization (Box View) 1 2 dom0 HW type 1 Para-virtualization I/O Host HW type 2 dom0 HW type 1 Full virtualization I/O Host
How To Create A Cloud Based System For Aaas (Networking)
1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on
Virtual Switching Without a Hypervisor for a More Secure Cloud
ing Without a for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton) 1 Public Cloud Infrastructure Cloud providers offer computing resources
How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/
Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Knut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
Virtual Machines. Virtualization
Virtual Machines Marie Roch Tanenbaum 8.3 contains slides from: Tanenbaum 3 rd ed. 2008 1 Virtualization Started with the IBM System/360 in the 1960s Basic concept simulate multiple copies of the underlying
Hardware Based Virtualization Technologies. Elsie Wahlig [email protected] Platform Software Architect
Hardware Based Virtualization Technologies Elsie Wahlig [email protected] Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization
SUSE Linux Enterprise 10 SP2: Virtualization Technology Support
Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the
Advanced Computer Networks. Network I/O Virtualization
Advanced Computer Networks 263 3501 00 Network I/O Virtualization Patrick Stuedi Spring Semester 2014 Oriana Riva, Department of Computer Science ETH Zürich 1 Outline Last week: Today: Software Defined
Recon 2011 - Montreal
How to develop a rootkit for Broadcom NetExtreme network cards Guillaume Delugré Sogeti / ESEC R&D guillaume(at)security-labs.org Recon 2011 - Montreal . Delugré How to develop a rootkit for Broadcom NetExtreme
Transparent Monitoring of a Process Self in a Virtual Environment
Transparent Monitoring of a Process Self in a Virtual Environment PhD Lunchtime Seminar Università di Pisa 24 Giugno 2008 Outline Background Process Self Attacks Against the Self Dynamic and Static Analysis
The Price of Safety: Evaluating IOMMU Performance Preliminary Results
The Price of Safety: Evaluating IOMMU Performance Preliminary Results Muli Ben-Yehuda [email protected] IBM Haifa Research Lab The Price of Safety: Evaluating IOMMU Performance, 2007 Spring Xen Summit p.1/14
The Microsoft Windows Hypervisor High Level Architecture
The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16
Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating
Practical Applications of Virtualization. Mike Phillips <[email protected]> IAP 2008 SIPB IAP Series http://stuff.mit.edu/iap/ http://stuff.mit.
Practical Applications of Virtualization Mike Phillips IAP 2008 SIPB IAP Series http://stuff.mit.edu/iap/ http://stuff.mit.edu/sipb/ Some Guy Rambling About Virtualization Stuff He's Read
Hypervisor-Based, Hardware-Assisted System Monitoring
Horst Görtz Institute for IT-Security, Chair for System Security VMRay GmbH Hypervisor-Based, Hardware-Assisted System Monitoring VB2013 October 2-4, 2013 Berlin Carsten Willems, Ralf Hund, Thorsten Holz
Fine-grained covert debugging using hypervisors and analysis via visualization
Reverse Engineering by Crayon: Game Changing Hypervisor and Visualization Analysis Fine-grained covert debugging using hypervisors and analysis via visualization Daniel A. Quist Lorie M. Liebrock Offensive
Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM
Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture
Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
KVM: Kernel-based Virtualization Driver
KVM: Kernel-based Virtualization Driver White Paper Overview The current interest in virtualization has led to the creation of several different hypervisors. Most of these, however, predate hardware-assisted
Code Injection From the Hypervisor: Removing the need for in-guest agents. Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs
Code Injection From the Hypervisor: Removing the need for in-guest agents Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs SADE: SteAlthy Deployment and Execution Introduction
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Abstract. 1. Introduction. 2. Threat Model
Beyond Ring-3: Fine Grained Application Sandboxing Ravi Sahita ([email protected]), Divya Kolar ([email protected]) Communication Technology Lab. Intel Corporation Abstract In the recent years
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
I/O virtualization. Jussi Hanhirova Aalto University, Helsinki, Finland [email protected]. 2015-12-10 Hanhirova CS/Aalto
I/O virtualization Jussi Hanhirova Aalto University, Helsinki, Finland [email protected] Outline Introduction IIoT Data streams on the fly processing Network packet processing in the virtualized
Hybrid Virtualization The Next Generation of XenLinux
Hybrid Virtualization The Next Generation of XenLinux Jun Nakajima Principal Engineer Intel Open Source Technology Center Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
Hypervisors and Virtual Machines
Hypervisors and Virtual Machines Implementation Insights on the x86 Architecture DON REVELLE Don is a performance engineer and Linux systems/kernel programmer, specializing in high-volume UNIX, Web, virtualization,
Nested Virtualization
Nested Virtualization Dongxiao Xu, Xiantao Zhang, Yang Zhang May 9, 2013 Agenda Nested Virtualization Overview Dive into Nested Virtualization Details Nested CPU Virtualization Nested MMU Virtualization
KVM KERNEL BASED VIRTUAL MACHINE
KVM KERNEL BASED VIRTUAL MACHINE BACKGROUND Virtualization has begun to transform the way that enterprises are deploying and managing their infrastructure, providing the foundation for a truly agile enterprise,
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Virtual Private Systems for FreeBSD
Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system
Survey on virtual machine security
Survey on virtual machine security Bright Prabahar P Post Graduate Scholar Karunya university Bijolin Edwin E Assistant professor Karunya university Abstract Virtualization takes a major role in cloud
Xen Live Migration. Networks and Distributed Systems Seminar, 24 April 2006. Matúš Harvan Xen Live Migration 1
Xen Live Migration Matúš Harvan Networks and Distributed Systems Seminar, 24 April 2006 Matúš Harvan Xen Live Migration 1 Outline 1 Xen Overview 2 Live migration General Memory, Network, Storage Migration
Exploiting the x86 Architecture to Derive Virtual Machine State Information
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies Exploiting the x86 Architecture to Derive Virtual Machine State Information Jonas Pfoh, Christian Schneider,
Chapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
Virtually Pwned Pentesting VMware. Claudio Criscione @paradoxengine [email protected]
Virtually Pwned Pentesting VMware Claudio Criscione @paradoxengine [email protected] /me Claudio Criscione The need for security Breaking virtualization means hacking the underlying layer accessing
VMkit A lightweight hypervisor library for Barrelfish
Masters Thesis VMkit A lightweight hypervisor library for Barrelfish by Raffaele Sandrini Due date 2 September 2009 Advisors: Simon Peter, Andrew Baumann, and Timothy Roscoe ETH Zurich, Systems Group Department
NoHype: Virtualized Cloud Infrastructure without the Virtualization
NoHype: Virtualized Cloud Infrastructure without the Virtualization Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby Lee Princeton University ISCA 2010 Virtualized Cloud Infrastructure Run virtual machines
Hypervisor Memory Forensics
Hypervisor Memory Forensics Mariano Graziano and Davide Balzarotti SANS DFIR EU SUMMIT October 2013 - Prague S3 GROUP S3 GROUP Actaeon Memory forensics of virtualization environments Locate any Intel Hardware
2972 Linux Options and Best Practices for Scaleup Virtualization
HP Technology Forum & Expo 2009 Produced in cooperation with: 2972 Linux Options and Best Practices for Scaleup Virtualization Thomas Sjolshagen Linux Product Planner June 17 th, 2009 2009 Hewlett-Packard
How To Write A Windows Operating System (Windows) (For Linux) (Windows 2) (Programming) (Operating System) (Permanent) (Powerbook) (Unix) (Amd64) (Win2) (X
(Advanced Topics in) Operating Systems Winter Term 2009 / 2010 Jun.-Prof. Dr.-Ing. André Brinkmann [email protected] Universität Paderborn PC 1 Overview Overview of chapter 3: Case Studies 3.1 Windows Architecture.....3
Machine check handling on Linux
Machine check handling on Linux Andi Kleen SUSE Labs [email protected] Aug 2004 Abstract The number of transistors in common CPUs and memory chips is growing each year. Hardware busses are getting faster. This
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009
SEE-GRID-SCI Virtualization and Grid Computing with XEN www.see-grid-sci.eu Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009 Milan Potocnik University
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization Jose Renato Santos Yoshio Turner G.(John) Janakiraman Ian Pratt Hewlett Packard Laboratories, Palo Alto, CA University of
Security Overview of the Integrity Virtual Machines Architecture
Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling
