On the Cutting Edge: Thwarting Virtual Machine Detection
|
|
|
- Barbara Goodwin
- 10 years ago
- Views:
Transcription
1 On the Cutting Edge: Thwarting Virtual Machine Detection Tom Liston, Senior Security Consultant Intelguardians Handler SANS Internet Storm Center Ed Skoudis, Founder / Senior Security Consultant Intelguardians Handler SANS Internet Storm Center [email protected] Tom Liston / Ed Skoudis 1 Hello, and welcome to our SANS@Night presentation on virtual machine detection, and some possible methods for thwarting the types of detection currently in use by malware in the wild. We ll start things off with an overview of some of the methods being used to detect the use of virtual machine environments how they work and what exactly they are detecting. Finally, we ll pass along some tips for making use of a virtualized environment more difficult for the bad guys to detect. So, please sit back, relax, and follow along. If you have any questions, please feel free to ask! Tom Liston [email protected] Ed Skoudis [email protected] 1
2 Virtual Machine Environment Applications Apps Apps Apps Guest OS Guest OS Guest OS Virtualization Layer (Process running on Host Operating System) Host Operating System Host computer x86 Architecture 2006 Tom Liston / Ed Skoudis 2 Virtual machine environments (VMEs), such as VMware, VirtualPC, Xen, BOCHS, and User-Mode Linux, let a user or administrator run one or more guest operating systems on top of another host operating system. Each of the guest operating systems run in an emulated environment and are provided by the VME with mediated access to both virtual and real hardware. In theory, the environment provided by the VME is self contained, isolated, and indistinguishable from a real machine. 2
3 Virtualization Benefits By consolidating multiple servers onto a single hardware platform Decrease hardware costs Simplify maintenance Improve reliability These benefits are driving a boom in virtualization use Both Intel and AMD have announced processor extensions to support virtualization 2006 Tom Liston / Ed Skoudis 3 Virtualization of both clients and servers has several very tangible benefits that are driving a boom in the use of VMEs. Obviously, there are cost benefits anytime you can decrease the number of physical machines required within your environment, but some of the ease-of-use benefits of VMEs have an impact on the bottom line as well. The ability to rollback any changes to a virtual server makes testing and maintenance far easier, reducing support costs. By focusing limited support dollars on a smaller number of machines, reliability is increased. Given the rising use of VMEs, computer attackers are very interested in detecting the presence of VMEs, both locally on a potential VME and across the network. Beyond simply their increased use, however, there are some specific uses of VME technology that are driving the computer underground toward deploying techniques for virtual machine detection. We ll explore some of these uses in-depth in the next two slides. 3
4 Virtual Machine Detection Why? 1) Malicious code researchers increasingly use virtual machine technology to analyze samples Virtualization offers many benefits: Multiple operating systems Ability to reset to a previous snapshot undoing any changes made by the malware Easily monitored Isolation Hmmmm. We ll take another look at this one later 2006 Tom Liston / Ed Skoudis 4 Because so many security researchers rely on VMEs to analyze malicious code, malware developers are actively trying to foil such analysis by detecting VMEs. If malicious code detects a VME, it can shut off some of its more powerful malicious functionality so that researchers cannot observe it and devise defenses. Given the malicious code s altered functionality in light of a VME, some researchers may not notice its deeper and more insidious functionality. We are seeing an increasing number of malicious programs carrying code to detect the presence of virtual environments. 4
5 Virtual Machine Detection Why? ( continued) 2) Virtual machines are often used to create honeypot or honeynet environments This is done for the same reasons as for malicious code research 3) Questionable usage patterns Bridging deployment Using a single host machine with multiple guests, each accessing networks with different security levels Firewall deployment Deploying an insecure OS or application on a guest, and relying on the VME for isolation or reset-ability 2006 Tom Liston / Ed Skoudis 5 Individuals and organizations that deploy honeypots or honeynets as research tools are attracted to virtualization technology for many of the same reasons as malicious code researchers. Given the possibility that the machine that he just 0wnz3r3d might be part of a virtual honeynet and that his every move may now be monitored, Joe-Hacker has a very strong motivation to discover that fact. However, as virtualization technology is increasingly deployed in the mainstream, this becomes less and less of a sure indicator that the system is of questionable value. Finally, there are what we will call questionable usage patterns of virtualization technology: deployments that rely more than they probably should on the isolation aspects of virtualization. In these instances, virtual machine detection schemes are seen as a precursor to other types of attacks aimed at compromising that isolation : backdoor virtual machine-to-virtual machine communication and, the Holy Grail of VME attacks, virtual machine escape. 5
6 Local Virtual Machine Detection Goal: Detect if you are inside a virtual machine (guest operating system) from within the machine Am I running inside the Matrix, or in the Real World? There are currently four categories of methods for locally detecting the presence of a virtual machine: 1. Look for VME artifacts in processes, file system, and/or registry 2. Look for VME artifacts in memory 3. Look for VME-specific virtual hardware 4. Look for VME-specific processor instructions and capabilities Covers nearly all of the elements of the virtual machine 2006 Tom Liston / Ed Skoudis 6 The attacker s goal is to detect if their code is running in a virtual machine, or running on a real system. Are they in The Matrix, or The Real World? To detect a virtual machine, an attacker has numerous options. There are four categories of local VME detection used today, including: Looking for VME artifacts in processes, file system, and/or registry Looking for VME artifacts in memory Looking for VME-specific virtual hardware Looking for VME-specific processor instructions and capabilities If you think about it, you ll realize that most modern computer systems consist of a file system, memory, various hardware components, and the processor itself. The local VME detection mechanisms in this list cover each of these elements, analyzing each component as a generalized category of methods for VME detection. Thus, given that these four categories entail all the elements of a modern computer, any additional methods for local VME detection will likely still fit into the framework of these four categories. 6
7 1) VME Artifacts in Processes, File System, and/or Registry Some VMEs insert elements into the Guest that can be easily found Running processes or services Files and/or directories Specific registry keys Some Phatbot malware specimens use this technique In a VMware Workstation WinXP Guest: Running VMtools service Over 50 different references in the file system to VMware and vmx Over 300 references in the Registry to VMware This method is of limited utility, easily fooled Rootkit-like techniques tweak the operating system to hide artifacts from users Similar techniques could be applied to hide VME 2006 Tom Liston / Ed Skoudis 7 Some virtual machine tools insert an enormous amount of tell-tale signs in the guest operating system, including running processes and services, files and directories, and registry keys. Some instances of the phatbot malicious code look for these items from VMware. In a VMware Workstation Windows XP Guest, there is the running Vmtools service, over 50 references in the file system to VMware and vmx, and over 300 references in the registry to VMware. That s a lot of areas to choose from for the attacker to detect the virtual machine. However, while the pickings are plentiful, they aren t too reliable. A researcher could hide these items by employing various techniques borrowed from malicious rootkit technologies. Thus, the bad guys detection mechanism can be readily fooled. 7
8 2) Look for VME Artifacts in Memory The Guest system memory map has some differences from the Host memory map Strings found in memory In a VMware Workstation WinXP Guest, we dumped RAM using dd We found over 1,500 references to VMware in memory Rather a heavy-weight approach, but could be refined to focus on specific regions Some critical operating system structures located in different places Much quicker, easier, and hard to fool without redesign of VME One particular memory difference is the location of the Interrupt Descriptor Table (IDT) On Host machines, it is typically low in memory On Guest machines, it is typically higher in memory Cannot be the same, because the processor has a register pointing to it (IDTR) This technique is usable across different VMEs (VirtualPC and VMware) and more difficult to fool 2006 Tom Liston / Ed Skoudis 8 A second area of VME detection involves looking for anomalies in memory introduced by the virtualization process. First off, the attacker could search through system memory for references to the virtual machine. To test this, we dumped the memory from a running WindowsXP VMware guest, and found over 1,500 references to VMware in memory. Dumping and searching memory is a performance hog, so the technique is not trivial to deploy. But, targeting specific areas of memory, where an attacker reliably knows to look, might make the technique more effective. A better memory-related technique involves looking at pointers to critical operating system tables that are typically relocated on a virtual machine. One such table is the Interrupt Descriptor Table (IDT), which tells the system where various operating system interrupt handlers are located in memory. On real machines, the IDT is located lower in memory than it is on guest (i.e., virtual) machines. This IDT-related technique is nice because it can be applied on both VirtualPC and VMware and between Linux and Windows. Also, because it is part of the underlying architecture of the VME, it is much harder to fool. 8
9 The Red Pill In November 2004, Joanna Rutkowska released a simple tool called "The Red Pill" that reliably detects virtual machine usage without looking for file system artifacts Instead, this tool runs a single machine language instruction, SIDT Store Interrupt Descriptor Table This instruction, which can be run in user mode, takes the location of the Interrupt Descriptor Table Register (IDTR) and stores it in memory 2006 Tom Liston / Ed Skoudis 9 In November 2004, a researcher named Joanna Rutkowska introduced code that implements this IDT-checking concept. Her code, called "The Red Pill", runs a single machine language instruction, called SIDT. This instruction stores the contents of the Interrupt Descriptor Table Register (the IDTR which points to the IDT) in a processor register, where it is analyzed. 9
10 How The Red Pill Works The Red Pill simply runs the SIDT instruction and then checks the results Rutkowska observed that: On VMware guest machines, the IDT is typically located at 0xffXXXXXX On VirtualPC guests, it is located at 0xe8XXXXXX On host operating systems, it is located lower than that, typically around 0x80ffffff (Windows) and 0xc0ffffff (Linux) The Red Pill merely looks at the first byte returned by SIDT If it s greater than 0xd0, you've got a virtual machine If it is less than or equal to 0xd0, you are in a real machine 2006 Tom Liston / Ed Skoudis 10 The Red Pill simply looks at the IDTR (via the SIDT instruction). Rutkowska observed that on VMware guest machines, the IDT is typically located at 0xffXXXXXX, while on VirtualPC guests, it is located at 0xe8XXXXXX. For host operating systems, the IDT is located far lower in memory. To handle both conditions, the Red Pill checks to see if the IDTR is greater than 0xd If so, the Red Pill prints a message saying that it is running in a guest operating system. If the returned result is less than or equal to that value, the Red Pill says that it is running on a host machine. We have found that the results are highly accurate for both VirtualPC and VMware, running both in RedHat Linux 7.2, 8.0, 9.0, and Enterprise 3.0. It likewise is accurate in Windows 2000, XP, and
11 The Red Pill on Various VMs This program works like a charm in detecting various virtual machine types, including: VMWare VirtualPC Perhaps others??? Needs further testing Works regardless of virtual and real operating system type Tested on both Windows (2000/XP/2003) and Linux (RH 8/9/Fedora Core 2/FC4) Although, some Linux security packages (grsecurity, PAX, etc.) prevent this call from Ring 3 to Ring Tom Liston / Ed Skoudis 11 In fact, this tool functions quite nicely on VMWare and VirtualPC. We are currently in the process of testing other virtual environments. Also, the technique works regardless of the operating system type, for the most part. The technique works on Windows almost all of the time. On some Linuxes, however, additional security fixes prevent it from working. These alterations prevent certain kinds of memory access from Ring 3. Therefore, on such machines, the Red Pill will seg fault. This is a consequence of how Rutkowska wrote her code, and can be somewhat easily fixed. 11
12 Expanding on the Red Pill Besides the IDT (measured by the SIDT instruction), there are other tables in memory that are shifted by VMEs Which have pointers in the processor That can be measured with single machine language instructions The Global Descriptor Table (GDT), measured by the SGDT instruction The Local Descriptor Table (LDT), measured by the SLDT instruction 2006 Tom Liston / Ed Skoudis 12 So, the IDT analysis can be fruitful, but there are other critical operating system structures an attacker can look to for detecting VMEs, notably the Global Descriptor Table (GDT) and the Local Descriptor Table (LDT). These tables hold critical variables associated with the operating system and particular running processes, respectively. 12
13 Scoopy A free suite of VME detection tools by Tobias Klein at Scoopy runs SIDT, SGDT, and SLDT Checks to see of the IDT is located at an address that starts with 0xc0 (Linux) and 0x80 (Windows). If it does, Scoopy prints a message indicating that it is running in a host machine. Otherwise, it prints that it is in a guest operating system Klein uses identical logic to compare the GDT s location with 0xc0XXXXXX to get a second opinion on the matter And then, he looks at the LDT (only 2 bytes) If LDT is located at 0x0000, it is a real machine, else VMware That s three tests for the price of one! 2006 Tom Liston / Ed Skoudis 13 Tobias Klein wrote the Scoopy suite that looks at the location of the IDT (like the Red Pill), the GDT, and the LDT, using the IA32 SIDT, SGDT, and SLDT instructions respectively. Klein observed that host operating systems have an IDT located at memory location 0xc0XXXXXX (which is consistent with the Red Pill, in that it is lower than 0xd0XXXXXX). Scoopy checks to see of the IDT is located at an address that starts with 0xc0. If it does, Scoopy prints a message indicating that it is running in a host machine. Otherwise, it prints that it is in a guest operating system. Klein uses identical logic to compare the GDT s location with 0xc0XXXXXX to get a second opinion on the matter. Finally, Klein observed that the LDT on a host machine is typically at location 0x0000. On guests, it has some other value. With three different tests for virtual machines, Scoopy has quite accurate results. 13
14 3) Look for VME-Specific Virtual Hardware VME introduces virtualized hardware Network USB controller Audio adapters Some of these have distinct fingerprints MAC addresses on NICs USB controller type SCSI device type Also, anomalies in the way the Guest system clock is updated Easy-to-write code, but likely easily fooled Again, using rootkits 2006 Tom Liston / Ed Skoudis 14 A third category of VME detection mechanisms involves looking for specific virtualized hardware, such as NIC cards (with VMware MAC addresses), USB controllers, and audio adapters. Also, some VMEs introduce specific SCSI devices that can be detected. Some VMEs also introduce anomalies on the system clock associated with host<->guest clock synchronization. Oftentimes, inside of a guest, one second doesn t always take one second. Once, when doing a lab for SANS Security 504, a student s clock in a guest operating system didn t change seconds for over 2 minutes! Such anomalies can be detected by attackers. 14
15 VME-Specific Hardware Checks with Doo Included with Scoopy, Tobias Klein has Doo Linux version of Doo: Simple shell script looks for VMware located in: /proc/iomem /proc/ioports /proc/scsi/scsi dmesg command (print kernel ring buffer; holds boot messages and related logs from kernel) Also looks in dmesg output for BusLogic BT-958 and pcnet32 - These are known VMware devices Windows version of Doo: Uses Windows Scripting Host to read 2 registry keys associated with SCSI to look for VMware Uses WSH to read 2 other registry keys associated with specific Class ID of VMware virtualized hardware 2006 Tom Liston / Ed Skoudis 15 The Doo tool by Tobias Klein (who was also the author of Scoopy) looks for virtualized hardware. The Linux version first combs through various places in the virtual /proc directory looking for the string VMware associated with IO, ports, and SCSI. It also looks for messages from the kernel (via the dmesg command) to see if any boot messages mention VMware-specific hardware. The Windows version of Doo looks for registry keys associated with VMware SCSI adapters and Class IDs of VMware hardware, by checking for: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0\Identifier HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0\Identifier HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\ {4D36E968-E325-11CE-BFC BE10318}\0000\DriverDesc HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\ {4D36E968-E325-11CE-BFC BE10318}\0000\ProviderName 15
16 4) Look for VME-Specific Processor Instructions and Capabilities Some VMEs introduce extra machine-language instructions beyond the standard x86 instruction set to foster Guest-to-Host communication or for other virtualization issues For detection, code could play a non-standard x86 instruction used by VMware, VirtualPC, or Xen into processor to see if it rejects it or handles it A program called VMDetect does this Alternatively, we could look for unusual processor behavior associated with normal machine language instructions A program called Jerry does this 2006 Tom Liston / Ed Skoudis 16 One of the most interesting areas of VME detection involves analyzing the processor to see if it has any behavioral characteristics of a virtual machine. Two VME processor anomalies are used today to identify VMEs: looking for support for non-standard VME machine language instructions, and identifying a guest-tohost communication channel. 16
17 VME Detection with VMDetect VMDetect uses different techniques for detecting VirtualPC and VMware Written by lallous Highly effective Hard to dodge Free To detect VirtualPC, VMDetect: 1) Registers its own handler for invalid OpCodes 2) Runs a VirtualPC-specific non-standard IA32 instruction 3) If the processor runs the instruction, it is VirtualPC 4) If the handler for invalid OpCodes is called, it it s a real machine VMDetect is available at: Tom Liston / Ed Skoudis 17 A tool called VMDetect determines if it is running within VirtualPC using a fascinating technique. It does this by attempting to use one of the non-standard x86 instructions that VirtualPC uses for guest-to-host communication. In a real (non-vme) computer, the use of a non-standard instruction would create a processor exception, or error, in the running application. The processor would then stop running the program and notify the operating system that an error had occurred in the application s execution. At that point, the operating system would attempt to gracefully shut down the errant program. However, it is possible for a programmer with sufficient foresight to know that there may be situations where a program will cause one of several different types of processor exceptions. Thus, a developer can write software to tell the operating system that it has built-in functions capable of dealing with specific types of errors. These functions are known as error-handling code, and it is this mechanism that VMDetect exploits to allow it to detect VirtualPC. By registering error-handling code with the operating system, VMDetect can cause execution to follow one of two possible paths, depending on whether or not the application is running on VirtualPC. If the program is running in a non-virtual environment, then immediately after attempting to use a non-standard instruction, execution will branch to the program s error handler. If the program is running on a VME, then when the program executes the non-standard instruction, execution will continue as if nothing had happened. No error-handling code will be invoked, and thus VMDetect can accurately infer that it is running inside a VirtualPC environment. Otherwise, if an exception is thrown and error-handling code is invoked to deal with the non-standard instruction, VMDetect determines that it is not running in a virtualized environment. 17
18 Detecting VMware s ComChannel Many ease-of-use features offered by VMware require a means for communication between host and guest Shared clip-board File sharing Drag-and-drop Time synchronization, etc. VMware accomplishes this by subverting the functionality of a certain x86 instructions Detecting the presence of this backdoor is the most popular VM detection method in use today Included in VMDetect Also included in Jerry.c by Tobias Klein Also included in checkvm, formerly a part of vmtools Also included in scads of really evil malware 2006 Tom Liston / Ed Skoudis 18 If you re an attacker, and you re even mildly interested in virtual machine detection, you re going to target VMware, because it is, without any doubt, the most widely deployed virtualization environment. So, it should come as no surprise that the most popular VME detection mechanism of all, the most widely used in malicious code today, involves detecting the presence of the VMware by detecting the communications channel VMware uses to send data between guest and host. This channel, implemented by adding some functionality to the IN machine language instruction on VMware guests, is used for shared clipboards, file sharing, and drag and drop features between guests and host systems in VMware. VMDetect, Jerry, and checkvm are all tools that implement this technique. We have also located many examples of very nasty malware that uses this technique, described in detail on the next slide. 18
19 VMware Detection with VMDetect at the Machine Language Level MOV EAX,564D5868 <-- "VMXh" MOV EBX,0 MOV ECX,0A MOV EDX,5658 <-- "VX" IN EAX,DX <-- Check for VMWare CMP EBX,564D5868 First, the EAX register is loaded with the magic value required for the use of the communication channel ( VMXh ) ECX is loaded with a command value (0x0A which is used to request VMware version information from the host) Any parameters needed for the command (in this case there are none) are loaded in EBX Finally, the IN instruction (used for port I/O) is used, which would normally attempt to load data from port 0x5658 ( VX ) If we are outside VMware, a privilege error occurs. If we re inside VMware, the magic value (VMXh) is moved to register EBX; otherwise it is left at 0 Based on the version values returned, we can even determine the specific VMware product (Workstation, ESX, GSX, etc.) 2006 Tom Liston / Ed Skoudis 19 The machine language on this slide looks for the VMware guest-to-host channel, by checking for a strange processor property of VMware guests. This code attempts to invoke the VMware guest-to-host communication channel. This channel is actually created by the VME overloading the functionality of a specific x86 instruction, IN. The IN instruction is normally used to read a byte, word, or dword of data from an I/O port (i.e., from a device, like a modem, connected to the computer). It requires two parameters: the first indicates what register is to be the destination for the data, and the second is a number indicating what port is to be accessed. For the instruction type used by VMware, the port number is placed in the processor register DX before the instruction is executed. VMware monitors any use of the IN instruction, and captures any I/O destined for a specific port number (0x5658) but only when the value of another processor register, EAX, is a very specific magic number. In the code listed above, the malicious software is attempting to detect VMware by first loading EAX with this magic value, VMXh. A specific command for VMware to process (in this case 0x0A or decimal 10) is loaded in ECX and parameter data (in this case, 0) is loaded into register EBX. The special port number (0x5658 which also stands for the characters VX ) is loaded into register EDX. With those values in place, the code then calls the machine language instruction IN. On a non-virtual machine, calling this instruction will cause a processor exception (that is, an error) and will trigger specifically provided exception handling code elsewhere within the malicious software. On a guest machine inside of VMware, the IN instruction will be monitored and allowed to succeed without error by VMware which will then change the values in the processor s registers before returning execution to the code. The end result will be that the magic value, VMXh will be moved into register EBX. The code then compares EBX to this value and continues on, knowing for certain that it is running in a virtual environment. 19
20 Remote VME Detection Across the network, VME detection can be accomplished by: Looking for timing anomalies in ICMP and TCP We are experimenting with code to do this; nothing released yet Looking for IP ID strangeness NAT with Windows on a Linux host might have nonincremental IPID packets, interspersed with incremental IPID packets Looking for unusual headers in packets Timestamps and other optional parameters may have inherent patterns Continuing area of research 2006 Tom Liston / Ed Skoudis 20 The four techniques we ve discussed so far detect a VME locally. Other techniques are being analyzed to detect a VME remotely. One technique that has great promise is to look for timing anomalies in the timestamps associated with ICMP and TCP. We ve developed an in-house tool for measuring the discrepancies introduced by virtual clocks, which give us an 80% success rate in identifying VMEs remotely. Also, because different operating systems assign the IP ID values of packets they send differently, it might be possible to identify a VME using NAT networking based on the IP ID values. For example, Windows machines set their IP ID values incrementally, while Linux machines set IP ID values to a pseudo random number. If we have a VMware machine with NAT networking for a Windows guest and Linux host, the observed packets coming from a single IP address could have IP ID values of A, B, C, C+1, C+2, C+3, D, E, C+4, C+5, F, and so on. What we are witnessing is the Linux IP ID values (A, B, C, D, E, and F) intermixed with the incremental Windows IP ID values (C+1, C+2, C+3, etc.) Another remote VME detection mechanism is to look for patterns in the packets that are set by virtual machines. We haven t yet identified any in our research, but are looking for them. 20
21 Thwarting Local VM Detection We re going to focus our efforts on the most widely deployed means of detecting virtual machines: detection of the VMware communication channel So VMware s idea of a requiring a magic value to access the communication channel is great except for one small problem: IT S ALWAYS THE SAME VALUE 2006 Tom Liston / Ed Skoudis 21 All we can say is Aaaaaaarrrrrrgh! VMware started strong and then faded on the back stretch. They had a really good idea to require a specific value be used in order to authenticate to the command channel, but then they USED A CONSTANT VALUE. Essentially, once the bad guys know this value, the VMware communication channel requires no authentication to use, and so there is nothing to keep the bad guys from using it to detect that virtualization is in use. Sigh. So, what if we were able to change that value? 21
22 Thwarting Local VM Detection (continued ) VMmutate is a small proof-of-concept executable that attempts to change the VMware magic value to a user-specified alternative Problems: The value must be changed, not only in the VMware executable itself, but also in any programs or drivers WITHIN each guest that rely on the communication channel This can be done by scanning through the guest disk image files, locating and changing instances of the magic value But guests are BIG. In big files, simply by chance, you re going to find false positives. So VMmutate must be very careful about what it changes Limited success We ve gotten some machines to the point of booting, but the keyboard and mouse (and perhaps other things) don t work correctly Networking (surprisingly!) does appear to work correctly Perhaps these machine could just be controlled via SSH like God intended Tom Liston / Ed Skoudis 22 In an attempt to provide a means of changing this static value, we have developed a proof-of-concept executable called VMmutate. VMmutate is essentially a high speed search-and-replace tool that is designed to find the fixed VMXh magic value used to access the VMware communication channel and change it to a userspecified alternate value. Because this value is used both within the VME software on the host as well as by various support programs and drivers within the guest, VMmutate must be able to alter this string in both portions of the VME. The disk image files used by VMware are ideally suited to this type of operation with one minor problem: VMware disk images are generally HUGE. When scanning through these files, simply by pure chance, we re going to come across many instances of the magic value that are not involved in the use of the communication channel. VMmutate does a great deal of context checking in order to be sure that it isn t changing a value that it shouldn t. Still, the best we ve been able to do is to coax a VM into booting (which was an accomplishment in and of itself did you know that really messed up VMs actually make POST beeps?) but with severely limited functionality (i.e. no keyboard, no mouse). But there s always SSH! 22
23 Thwarting Local VM Detection (continued ) Another way to skin this cat VMware Configuration Options used in the guest s.vmx file isolation.tools.getptrlocation.disable = "TRUE" isolation.tools.setptrlocation.disable = "TRUE" isolation.tools.setversion.disable = "TRUE" isolation.tools.getversion.disable = "TRUE" monitor_control.disable_directexec = "TRUE" monitor_control.disable_chksimd = "TRUE" monitor_control.disable_ntreloc = "TRUE" monitor_control.disable_selfmod = "TRUE" monitor_control.disable_reloc = "TRUE" monitor_control.disable_btinout = "TRUE" monitor_control.disable_btmemspace = "TRUE" monitor_control.disable_btpriv = "TRUE" monitor_control.disable_btseg = "TRUE" 2006 Tom Liston / Ed Skoudis 23 It turns out that there are a number of undocumented features in VMware that can be used to mitigate the detectability of VMware by various means. VMware uses a text file with the extension.vmx to set various configuration options. These options control the behavior of various sub-systems and components of the guest VM: the CD-ROM, floppy disk, networking, etc By placing these configuration options in the.vmx file associated with a particular guest VM, the VM detection techniques used by Jerry.c (and most VM detecting malware), the RedPill, and Scoopy are nullified. 23
24 Thwarting Local VM Detection (continued ) Problems! VMtools and many other ease-of-use features are BROKEN These must be applied to a guest VM when it is OFF, not simply sitting at a snapshot These are UNDOCUMENTED features, and we re not entirely sure what other side effects they may have 2006 Tom Liston / Ed Skoudis 24 Essentially, these configuration options break the communication channel between guest and host not just for the program trying to detect the VM, but for ALL programs. That means that basically all of the ease-of-use features of VMware will no longer work: no drag-and-drop, no shared folders, no shared clipboard, no time synchronization. Also, having played around with these options, there is one gotcha that we ll warn you about: you can only apply these options to a guest that is actually turned off. If you apply them to a machine sitting at a snapshot, firing that machine up will overwrite any changes that you ve made. Finally, because these are undocumented features, there may be other side-effects that we re unaware of. Use these settings at your own risk. 24
25 Finally a teaser We talked a bit before about what we called questionable usage patterns These are VME deployments that, we believe, overly rely on the isolation of guest machines from one another Here s why we feel that way 2006 Tom Liston / Ed Skoudis 25 When we introduced some of the forces behind the bad guy s drive toward developing virtual machine detection techniques, we talked a little about what we called questionable usage patterns, or VME deployments that rely on virtualizations guest-to-guest isolation to provide security. In many cases, this isolation isn t all it s cracked up to be as the next slide will illustrate. 25
26 Isolation? 2006 Tom Liston / Ed Skoudis 26 Just sayin'... you know... thinking out loud. ;-) 26
27 Thank you! Thank you for stopping by and sharing your evening with us Questions, praise, cash donations: Enraged hate mail, slanderous insults: 2006 Tom Liston / Ed Skoudis 27 Thank you for stopping by and we hope you found the presentation worthwhile. If you didn t, it s all Ed s fault. 27
Detecting the Presence of Virtual Machines Using the Local Data Table
Detecting the Presence of Virtual Machines Using the Local Data Table Abstract Danny Quist {[email protected]} Val Smith {[email protected]} Offensive Computing http://www.offensivecomputing.net/
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
A Comparison of VMware and {Virtual Server}
A Comparison of VMware and {Virtual Server} Kurt Lamoreaux Consultant, MCSE, VCP Computer Networking and Consulting Services A Funny Thing Happened on the Way to HP World 2004 Call for speakers at the
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
Code Injection From the Hypervisor: Removing the need for in-guest agents. Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs
Code Injection From the Hypervisor: Removing the need for in-guest agents Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs SADE: SteAlthy Deployment and Execution Introduction
Basic ESXi Networking
Basic ESXi Networking About vmnics, vswitches, management and virtual machine networks In the vsphere client you can see the network diagram for your ESXi host by clicking Networking on the Configuration
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
Clouds, Virtualization and Security or Look Out Below
Clouds, Virtualization and Security or Look Out Below Lee Badger Hardware Virtualization (Box View) 1 2 dom0 HW type 1 Para-virtualization I/O Host HW type 2 dom0 HW type 1 Full virtualization I/O Host
Report on virtualisation technology as used at the EPO for Online Filing software testing
Report on virtualisation technology as used at the EPO for Online Filing software testing Virtualisation technology lets one computer do the job of multiple computers, all sharing the resources - including
Virtual Security About the Security Pros and Cons of Server Virtualization
Virtual Security About the Security Pros and Cons of Server Virtualization Martin Wimmer Siemens AG, Corporate Technology, CT IC CERT D-80200 Munich, Germany [email protected] Abstract. Recently,
Operating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
Comparing Virtualization Technologies
CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational
Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.
Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers
COS 318: Operating Systems. Virtual Machine Monitors
COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Basics of Virtualisation
Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Solving the Five Most Common VMware Virtual Machine Issues. By David Davis, vexpert Co-Founder, ActualTech Media January, 2015
Solving the Five Most Common VMware Virtual Machine Issues By David Davis, vexpert Co-Founder, ActualTech Media January, 2015 Introduction Based on the analysis of several million virtual machines by opvizor,
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:
Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique
Retrospect 7.7 User s Guide Addendum
Retrospect 7.7 User s Guide Addendum 2011 Retrospect, Inc. All rights reserved. Retrospect 7.7 Users Guide Addendum, first edition. Use of this product (the Software ) is subject to acceptance of the license
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Virtualization for Security
Virtualization for Security t j Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting John Hoopes Technical Editor Aaron Bawcom Paul Kenealy Wesley J. Noonan Craig
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Virtualization. Explain how today s virtualization movement is actually a reinvention
Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.
Enterprise-Class Virtualization with Open Source Technologies
Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single
Security Overview of the Integrity Virtual Machines Architecture
Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling
Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS
VIRTUALIZATION 101 Brainstorm Conference 2013 PRESENTER INTRODUCTIONS Timothy Leerhoff Senior Consultant TIES 21+ years experience IT consulting 12+ years consulting in Education experience 1 THE QUESTION
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Virtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
Virtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
nanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor
6.828 Operating System Engineering: Fall 2003. Quiz II Solutions THIS IS AN OPEN BOOK, OPEN NOTES QUIZ.
Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.828 Operating System Engineering: Fall 2003 Quiz II Solutions All problems are open-ended questions. In
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture
Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM
Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Operating Systems. Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first
Operating Systems Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first JavaScript interpreter Web browser menu / icon / dock??? login??? CPU,
10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Comparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Migrating to ESXi: How To
ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
HyperV_Mon 3.0. Hyper-V Overhead. Introduction. A Free tool from TMurgent Technologies. Version 3.0
HyperV_Mon 3.0 A Free tool from TMurgent Technologies Version 3.0 Introduction HyperV_Mon is a GUI tool for viewing CPU performance of a system running Hyper-V from Microsoft. Virtualization adds a layer
CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS [email protected]
CEN 559 Selected Topics in Computer Engineering Dr. Mostafa H. Dahshan KSU CCIS [email protected] Access Control Access Control Which principals have access to which resources files they can read
Hyper-V R2: What's New?
ASPE IT Training Hyper-V R2: What's New? A WHITE PAPER PREPARED FOR ASPE BY TOM CARPENTER www.aspe-it.com toll-free: 877-800-5221 Hyper-V R2: What s New? Executive Summary This white paper provides an
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
The Plan Today... System Calls and API's Basics of OS design Virtual Machines
System Calls + The Plan Today... System Calls and API's Basics of OS design Virtual Machines System Calls System programs interact with the OS (and ultimately hardware) through system calls. Called when
Server-centric client virtualization model reduces costs while improving security and flexibility.
BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating
Advanced VMware Training
Goals: Demonstrate VMware Fault Tolerance in action Demonstrate Host Profile Usage How to quickly deploy and configure several vsphere servers Discuss Storage vmotion use cases Demonstrate vcenter Server
Chapter 4. System Software. What You Will Learn... Computers Are Your Future. System Software. What You Will Learn... Starting the Computer
What You Will Learn... Computers Are Your Future Chapter 4 The two major components of operating system software Why a computer isn t useful without an operating system The five basic functions of an operating
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Directions for VMware Ready Testing for Application Software
Directions for VMware Ready Testing for Application Software Introduction To be awarded the VMware ready logo for your product requires a modest amount of engineering work, assuming that the pre-requisites
Securing Your Cloud with Xen Project s Advanced Security Features
Securing Your Cloud with Xen Project s Advanced Security Features Russell Pavlicek, Xen Project Evangelist CloudOpen North America 2013 Who is the Old, Fat Geek Up Front? Xen Project Evangelist Employed
Using VMware Player. VMware Player. What Is VMware Player?
VMWARE APPLICATION NOTE VMware Player Using VMware Player This document contains the following sections: Work and Play in a Virtual World on page 1 Options and Features in VMware Player on page 4 Installing
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Best Practices for VMware ESX Server 2
Best Practices for VMware ESX Server 2 2 Summary VMware ESX Server can be deployed in many ways. In this document, we recommend specific deployment guidelines. Following these guidelines will maximize
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Guest Operating System. Installation Guide
Guest Operating System Installation Guide VMware, Inc. 3145 Porter Drive Palo Alto, CA 94304 www.vmware.com Please note that you will always find the most up-to-date technical documentation on our Web
matasano Hardware Virtualization Rootkits Dino A. Dai Zovi
Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
The Microsoft Windows Hypervisor High Level Architecture
The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its
VMware ESX Server 3 Configuration Guide
Date: 03/03/08 VMware ESX Server 3 Configuration Guide Enterprise Applications Division of the Systems and Network Analysis Center (SNAC) Information Assurance Directorate National Security Agency 9800
Red Hat enterprise virtualization 3.0 feature comparison
Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Microkernels, virtualization, exokernels. Tutorial 1 CSC469
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Hyper-V: Microsoft s
TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net Hyper-V: Microsoft s Approach to Server
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
VMware Backup and Recovery: What They Don t Tell You
: What They Don t Tell You VMware Backup and Recovery: What They Don t Tell You Table of Contents Introduction 3 ESX Server and Virtual Machine Backup Basics 4 VM Backup Methodology Alternatives 5 1. Backup
Distributed Systems. Virtualization. Paul Krzyzanowski [email protected]
Distributed Systems Virtualization Paul Krzyzanowski [email protected] Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Virtualization
A quantitative comparison between xen and kvm
Home Search Collections Journals About Contact us My IOPscience A quantitative comparison between xen and kvm This content has been downloaded from IOPscience. Please scroll down to see the full text.
Chapter 5 Cloud Resource Virtualization
Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.
