Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader

Similar documents
Virtual Switching Without a Hypervisor for a More Secure Cloud

IOS110. Virtualization 5/27/2014 1

Cloud^H^H^H^H^H Virtualization Technology. Andrew Jones May 2011

x86 ISA Modifications to support Virtual Machines

Intro to Virtualization

Virtualization & Cloud Computing (2W-VnCC)

Virtualization. Pradipta De

Virtual Hosting & Virtual Machines

COS 318: Operating Systems. Virtual Machine Monitors

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

Virtualization. Types of Interfaces

VIRTUALIZATION INTROSPECTION SYSTEM ON KVM-BASED CLOUD COMPUTING PLATFORMS. Advisor: Software Security Lab.

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

LiveBackup. Jagane Sundar

Before we can talk about virtualization security, we need to delineate the differences between the

Compromise-as-a-Service

Enabling Technologies for Distributed Computing

Performance tuning Xen

Is Virtualization Killing SSI Research?

Anh Quach, Matthew Rajman, Bienvenido Rodriguez, Brian Rodriguez, Michael Roefs, Ahmed Shaikh

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

Installing & Using KVM with Virtual Machine Manager COSC 495

Virtualization with Windows

Introduction to Virtualization & KVM

Operating Systems Virtualization mechanisms

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM

EXPLORING LINUX KERNEL: THE EASY WAY!

OPEN SOURCE VIRTUALIZATION TRENDS. SYAMSUL ANUAR ABD NASIR Warix Technologies / Fedora Community Malaysia

Enabling Technologies for Distributed and Cloud Computing

Clouds, Virtualization and Security or Look Out Below

Automated deployment of virtualization-based research models of distributed computer systems

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

A quantitative comparison between xen and kvm

Full and Para Virtualization

Virtualization Management the ovirt way

Enhancing Hypervisor and Cloud Solutions Using Embedded Linux Iisko Lappalainen MontaVista

Red Hat enterprise virtualization 3.0 feature comparison

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Virtualization: Know your options on Ubuntu. Nick Barcet. Ubuntu Server Product Manager

Deploy and test ovirt using nested virtualization environments. Mark Wu

2) Xen Hypervisor 3) UEC

NoHype: Virtualized Cloud Infrastructure without the Virtualization

Cloud Computing #6 - Virtualization

The QEMU/KVM Hypervisor

Onboarding VMs to Cisco OpenStack Private Cloud

Detection of virtual machine monitor corruptions

KVM on S390x. Revolutionizing the Mainframe

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

Virtualizing a Virtual Machine

Flight Processor Virtualization

CHOOSING THE RIGHT RED HAT ENTERPRISE LINUX SUBSCRIPTION. Gerry Riveros Senior Manager Server Solutions, Red Hat May 6, 2011

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtualization and Cloud Computing

Configuring and Managing a Private Cloud with Enterprise Manager 12c

Virtualization System Security

managing the risks of virtualization

Virtualization. Dr. Yingwu Zhu

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

How To Make A Virtual Machine Aware Of A Network On A Physical Server

Securing Your Cloud with Xen Project s Advanced Security Features

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors

RUNNING vtvax FOR WINDOWS

Virtual Computing and VMWare. Module 4

VIRTUALIZATION 101. Brainstorm Conference 2013 PRESENTER INTRODUCTIONS

Assessing the Performance of Virtualization Technologies for NFV: a Preliminary Benchmarking

RCL: Software Prototype

[VADP OVERVIEW FOR NETBACKUP]

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.

A Survey on Virtual Machine Security

Virtualization Technologies

Taming Hosted Hypervisors with (Mostly) Deprivileged Execution

Virtual Machines.

RCL: Design and Open Specification

Basics of Virtualisation

How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

OpenNebula Open Souce Solution for DC Virtualization

Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE PF1000 Overview. IT Network Global Solutions Division UNIVERGE Support Center

Computing Service Provision in P2P Clouds

6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)

A cure for Virtual Insanity: A vendor-neutral introduction to virtualization without the hype

KVM, OpenStack, and the Open Cloud

12. Introduction to Virtual Machines

Is Virtualization Killing SSI Research?

Operating System Structures

Virtualization. Explain how today s virtualization movement is actually a reinvention

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version Fix Pack 2.

Data Centers and Cloud Computing

OpenNebula Open Souce Solution for DC Virtualization

Optimize Server Virtualization with QLogic s 10GbE Secure SR-IOV

The Review of Virtualization in an Isolated Computer Environment

Virtualization Technology

Chapter 14 Virtual Machines

kvm: Kernel-based Virtual Machine for Linux

Transcription:

Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1

360 Marvel Team Established in May 2015, the first professional could computing and virtualization security team in China. Focusing on attack and defense techniques in virtualization system. fuzzing framework guest machine escape technology Hypervisor risk defense technology 2

Agenda Virtualization System Attack Surface The fuzzing framework Case study 3

Virtualization System Attack Surface 4

Cloud Computing 5

Hypervisor Types function Xen Kvm Vmware quantizing distribution flexible scheduling 6

Distinctions OS Guest OS Hardware emulator Guest OS Hardware emulator Hypervisor Physical Devices Normal Server Physical Devices Virtualization Server 7

Attacking Processes in cloud computing 1. Enter VM via web or other devices 2. Exploit virtualization system vulnerabilities to escape VM 3. lateral movements to others VMs on host 4. Access to host network 8

Operation Principles of device emulators 9

The attack surface Hardware virtualization components diversity Qemu: 30+ Vmware:20+ Bridge between inside-outside VM os -> device emulators -> Host os Related Vulnerabilities result big dangers 10

Compare to traditional targets Hardware virtualization focus on lower layers System Kernel Hypervisor Testing data totally different 11

Vulnerabilities found by us 12

Fuzzing Framework 13

Basic intro Attack surface : hardware virtual components Environment : qemu, vmware Testing results : more than 25 vulnerabilities Challenges : lower layers hard to predict; 14

Methods for testing hardware virtual components 1. Analyze data which flowed to components 2. Change flowed-in data s contents and timing 3. Recording all of tiny abnormal activities 4. Analyze abnormal activities, find reasons 5. optimize fuzz framework 15

Other factors of fuzz framework 1.Flexibility (other OS) vm in Linux coding in C and Python 2. Deeply understand VM system language for coding development environment coding style 16

Fuzz framework structure Server : Case database Data communicate Framework log database Monitor log analysis Log os Control Center os os os os os Host Host Client : Emulate analysis System hook Case load Data communicate Log Monitor : Hypervisor instrument Data communicate Log 17

Fuzz framework working flow Step 5 : get log from client & monitor Control Center Step 6 : analyze log Step 7 : analyze crash and exception Step 8 : optimize fuzzing framework Step 1 : get device emulator info os os os os os os Step 2 : get test template from server Step 3 : launch test Host Host Step 4 : monitor hypervisor 18

Get target components info 19

Testing data Device access ports Device deal with structures used by data. Device data processing 20

Testing data attacks User space: generate testing dat, send request to client kernel Kernel space: apply for memory, fill memory, send info to ports Device emulator:testing data user space Kernel space Device controller flow inside,trigger exceptions 21

Monitor VM management Snapshot Reboot VM device editing Dynamic debugging Debugging Mode on Start Load Debugging Plugin VM processing log User space Kernel space 22

Exceptions occur in device emulator VM os crash Hypervisor crash Invisible results 23

Advanced monitoring skills Dynamic Static 24

Optimize fuzz framework by using log data Client log Decrease invalid combinations Monitor log Promote coverage Server log 25

Limitation & Future Permission limitation More kinds of virtualization systems: Hyper-V;VMWARE More attack surfaces: hypercall;virtio;guest machine client About open source project 26

Case Study 27

Principle of e1000 Network Device Initialization Port Allocation, Address Mapping Device Status Setting, Resource Allocation Data Transfer 'Write Command' to device TDT register process of descriptor 3 types descriptor : context, data, legacy data xfer set status, wait for next instruction Processing Details Circular Memory TSO : tcp segmentation/flow control. 28

E1000 vulnerability analysis Qemu e1000 Network Device Vmware e1000 Network Device 29

Pcnet network card emulator working processes Io port write Control and Status Registers write Receive Send Virtual Network Interface 30

Pcnet vulnerability analysis Qemu pcnet Network Device 31

Summary Stay tuned for more achievements by 360 Marvel Team 32

Q & A Email:tangqinghao@360.cn QQ:702108451 33