Detection of virtual machine monitor corruptions

Similar documents
Virtual Switching Without a Hypervisor for a More Secure Cloud

Virtualization for Cloud Computing

Virtualization. Pradipta De

Cloud Computing #6 - Virtualization

Virtualization. Types of Interfaces

Compromise-as-a-Service

Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors

Full and Para Virtualization

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader

Virtualization with Windows

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

kvm: Kernel-based Virtual Machine for Linux

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

Virtualization Technology. Zhiming Shen

Virtual machines and operating systems

Nested Virtualization

Chapter 14 Virtual Machines

Basics of Virtualisation

Enabling Technologies for Distributed Computing

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

IOS110. Virtualization 5/27/2014 1

Virtualization System Security

Introduction to Virtualization & KVM

Enabling Technologies for Distributed and Cloud Computing

Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize

NoHype: Virtualized Cloud Infrastructure without the Virtualization

Jukka Ylitalo Tik TKK, April 24, 2006

Abstract. 1. Introduction. 2. Threat Model

RED HAT ENTERPRISE VIRTUALIZATION & CLOUD COMPUTING

RPM Brotherhood: KVM VIRTUALIZATION TECHNOLOGY

Introduction to Virtual Machines

Virtualization Technologies. Embrace the new world of healthcare

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.

KVM on S390x. Revolutionizing the Mainframe

Clouds, Virtualization and Security or Look Out Below

Before we can talk about virtualization security, we need to delineate the differences between the

KVM KERNEL BASED VIRTUAL MACHINE

Distributed Systems. Virtualization. Paul Krzyzanowski

Frontiers in Cyber Security: Beyond the OS

How To Create A Cloud Based System For Aaas (Networking)

Cloud Computing CS

OPEN CLOUD INFRASTRUCTURE BUILT FOR THE ENTERPRISE

Flight Processor Virtualization

Virtualization Technologies (ENCS 691K Chapter 3)

Virtual Machine Security

Chapter 5 Cloud Resource Virtualization

Machine Virtualization: Efficient Hypervisors, Stealthy Malware

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

Can PCI DSS Compliance Be Achieved in a Cloud Environment?

Taming Hosted Hypervisors with (Mostly) Deprivileged Execution

COS 318: Operating Systems. Virtual Machine Monitors

KVM: A Hypervisor for All Seasons. Avi Kivity avi@qumranet.com

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service

COM 444 Cloud Computing

Survey on virtual machine security

Security Challenges in Virtualized Environments

Beyond the Hypervisor

The QEMU/KVM Hypervisor

Distributed and Cloud Computing

HRG Assessment: Stratus everrun Enterprise

Improving the Security of Commodity Hypervisors for Cloud Computing

Enabling Intel Virtualization Technology Features and Benefits

BBM467 Data Intensive ApplicaAons

The Review of Virtualization in an Isolated Computer Environment

Cloud Architecture and Virtualisation. Lecture 4 Virtualisation

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Advanced Computer Networks. Network I/O Virtualization

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Data Centers and Cloud Computing

Virtualisation Without a Hypervisor in Cloud Infrastructures: An Initial Analysis

How To Make A Minecraft Iommus Work On A Linux Kernel (Virtual) With A Virtual Machine (Virtual Machine) And A Powerpoint (Virtual Powerpoint) (Virtual Memory) (Iommu) (Vm) (

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

Intel Virtualization Technology Overview Yu Ke

Dynamic Load Balancing of Virtual Machines using QEMU-KVM

Hypervisor Memory Forensics

EECatalog SPECIAL FEATURE

Virtualization & Cloud Computing (2W-VnCC)

Masters Project Proposal

KVM, OpenStack, and the Open Cloud

Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones May 2011

Tracing Kernel Virtual Machines (KVM) and Linux Containers (LXC)

VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS. Advisor: Software Security Lab.

Virtual Computing and VMWare. Module 4

Server and Storage Virtualization

Hybrid Virtualization The Next Generation of XenLinux

Intel Embedded Virtualization Manager

Intro to Virtualization

Virtualization. Jia Rao Assistant Professor in CS

Chapter 2 Addendum (More on Virtualization)

1 Higher National Unit credit at SCQF level 8: (8 SCQF credit points at SCQF level 8)

Knut Omang Ifi/Oracle 19 Oct, 2015

Hypervisors and Virtual Machines

Transcription:

Detection of virtual machine monitor corruptions Benoît Morgan, Eric Alata, Vincent Nicomette LAAS-CNRS - Dependable Computing and Fault Tolerance (TSF) Team Journée SEC 2 - June 30th, 2015 Detection of virtual machine monitor corruptions 1 / 13

Outline 1 2 3 Detection of virtual machine monitor corruptions 2 / 13

Context Project SVC Secured Virtual Cloud Project Investissement d Avenir Itrust, Bull, Eneed, Secludit, Eurogiciel, Val Informatique, Blue Mind, LAAS-CNRS, IRIT Project Coordinator : Bull LAAS 3 PhDs, 2 focusing on security Evaluation of intrusion detection mechanisms in clouds Detection of virtual machine monitor corruptions Detection of virtual machine monitor corruptions 3 / 13

Virtual machine monitors VM exit VM 1 VM Launch Hypervisor Hardware VM 2 VM exit Guest software Privileged software Transitions Hardware Privileged entity Ensures space and time isolation between virtual machines Control model similar to operating system control over userland applications Detection of virtual machine monitor corruptions 4 / 13

Motivations More and more complex VMM Xen, KVM, VMware ESXi Peripherals virtualisation Mass storage virtualisation Remote administration Vulnerabilities regularly discovered Large attack surface Necessity to detect the compromission of the hypervisor Detection of virtual machine monitor corruptions 5 / 13

Outline Trusted architecture Experimentation 1 2 Trusted architecture Experimentation 3 Detection of virtual machine monitor corruptions 6 / 13

Trusted architecture proposed Trusted architecture Experimentation A tiny security hypervisor (l 1 ) in charge of detecting corruption of virtualised hypervisor (l 2 ) VM1 l2 VM2 l2 VM3 l2 Hypervisor l 2 VM l1 Security hypervisor l 1 Hardware BUT, the security hypervisor (l 1 ) may be also attacked and compromised Hardware bugs Malicious peripherals Necessity to control the integrity of the security hypervisor itself through a trusted autonomous hardware component Detection of virtual machine monitor corruptions 7 / 13

Trusted architecture Experimentation An execution enclave of integrity checks Guarded Software Component Security Hypervisor Checks Hardware Trusted Hardware Component Integrity checks Challenge and environment checks 1 The integrity of the security hypervisor is regularly checked by the trusted hardware component through 1) challenges and 2) environment checks 2 The integrity of the guarded software component is checked by the security hypervisor 3 Alarms are raised when challenges or integrity checks fail Detection of virtual machine monitor corruptions 8 / 13

Prototype Trusted architecture Experimentation PC with Intel processor (VT-x, VT-d), PCI Express bus Trusted hardware component based on FPGA technology Bare metal security hypervisor using nested virtualisation technology Experimentation with Linux and a corrupted driver in the kernel as the Guarded Software Component Publications : SSTIC 2014[2] Detection of virtual machine monitor corruptions 9 / 13

Outline 1 2 3 Detection of virtual machine monitor corruptions 10 / 13

Current virtualisation of KVM ou VMware ESXi Improving the challenges and environment checks First prototype of recursive hypervisor (allowing to implement several security mechanisms at different privilege levels) Publications : SSTIC 2015[3] Detection of virtual machine monitor corruptions 11 / 13

Detection of virtual machine monitor corruptions Benoît Morgan, Eric Alata, Vincent Nicomette LAAS-CNRS - Dependable Computing and Fault Tolerance (TSF) Team Journée SEC 2 - June 30th, 2015 Detection of virtual machine monitor corruptions 12 / 13

Références [1] http://sarssi2013.univ-pau.fr/index.php/programme [2] https://www.sstic.org/2014/presentation/tests_ dintegrite_dhyperviseurs/ [3] https://www.sstic.org/2015/presentation/abyme un_ voyage_au_coeur_des_hyperviseurs_recursifs/ Démo 1 : https://youtu.be/nax0shux9gq Démo 2 : https://youtu.be/1yz_zua2kgm Detection of virtual machine monitor corruptions 13 / 13