Guardian: Hypervisor as Security Foothold for Personal Computers



Similar documents
Windows Server Virtualization & The Windows Hypervisor

vpro Prerequisites and Trade-offs for the dc7700 Business PC with Intel vpro Technology

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

Phoenix SecureCore TM Setup Utility

Virtualization. Michael Tsai 2015/06/08

9/26/2011. What is Virtualization? What are the different types of virtualization.

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

How to Install the VMware ESXi Hypervisor on Physical Hardware

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes!

PARALLELS SERVER 4 BARE METAL README

Frontiers in Cyber Security: Beyond the OS

NI Real-Time Hypervisor for Windows

Chapter 4. Backup / Restore

Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems

Introduction to the NI Real-Time Hypervisor

Why Computers Are Getting Slower (and what we can do about it) Rik van Riel Sr. Software Engineer, Red Hat

VMWARE WHITE PAPER 1

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

ViPNet ThinClient 3.3. Quick Start

Virtual Switching Without a Hypervisor for a More Secure Cloud

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

OSes. Arvind Seshadri Mark Luk Ning Qu Adrian Perrig SOSP2007. CyLab of CMU. SecVisor: A Tiny Hypervisor to Provide

Recover Tab & RecoverAssist User Guide

Installation Guide for Citrix XenServer 5.5

A+ Practical Applications Solution Key

Intro to Virtualization

Chapter 14 Virtual Machines

Dell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN

Security Overview of the Integrity Virtual Machines Architecture

EXPLORING LINUX KERNEL: THE EASY WAY!

Reborn Card NET. User s Manual

BIOS Update Release Notes

WIND RIVER SECURE ANDROID CAPABILITY

H ARDWARE C ONSIDERATIONS

Implementing Red Hat Enterprise Linux 6 on HP ProLiant servers

Virtual Machine Security

BIOS Update Release Notes

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Chapter 12: Windows XP, Vista, and 7

Full and Para Virtualization

COS 318: Operating Systems. Virtual Machine Monitors

Virtual Appliance Setup Guide

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

A Survey on Virtual Machine Security

Hardware/Software Guidelines

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

McAfee Firewall Enterprise

SubVirt: Implementing malware with virtual machines

Using AORUS Notebook for the First Time

User Manual. Copyright Rogev LTD

Yale Software Library

Microsoft Windows Server 2008* (x86 & x64) Dual SCM (ALUA) Installation BKM. Intel Order Number: E

Version 3.7 Technical Whitepaper

Proposal for Virtual Private Server Provisioning

Security Considerations in Cloud Deployments Matthew Garrett

Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers

Guide to SATA Hard Disks Installation and RAID Configuration

Getting Started Guide

Distributed Systems. Virtualization. Paul Krzyzanowski

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

User Guide. SUSIAccess. Remote Device Management

H ARDWARE C ONSIDERATIONS

How To Compare Two Servers For A Test On A Poweredge R710 And Poweredge G5P (Poweredge) (Power Edge) (Dell) Poweredge Poweredge And Powerpowerpoweredge (Powerpower) G5I (

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Migrating to ESXi: How To

Time Stamp. Instruction Booklet

EaseUS Todo Backup PXE Server

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

Securing Your Cloud with Xen Project s Advanced Security Features

Installing the Operating System or Hypervisor

The future is in the management tools. Profoss 22/01/2008

Windows 7 XP Mode for HP Business PCs

Upgrading Cisco UCS Central

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

ReadyNAS OS 6 Desktop Storage Systems

Backup & Disaster Recovery Appliance User Guide

Copyright by Parallels Holdings, Ltd. All rights reserved.

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version PROMISE Technology, Inc. All Rights Reserved.

Date 07/05/ :24:03. CENTREL Solutions. Author. Version Product XIA Configuration Server [ ]

General system requirements

Virtualization for Cloud Computing

Disk-to-Disk Backup Solution

Republic Polytechnic School of Information and Communications Technology C226 Operating System Concepts. Module Curriculum

Trusted VM Snapshots in Untrusted Cloud Infrastructures

Intel Entry Storage System SS4000-E

Virtualization Technology

PARALLELS SERVER BARE METAL 5.0 README

Troubleshooting Guide

Virtual Machines. COMP 3361: Operating Systems I Winter

NetScaler VPX FAQ. Table of Contents

VMware Server 2.0 Essentials. Virtualization Deployment and Management

Express5800/320Lb System Release Notes

Attacking Hypervisors via Firmware and Hardware

Transcription:

Guardian: Hypervisor as Security Foothold for Personal Computers Yueqiang Cheng, Xuhua Ding Singapore Management University (SMU) The International Conference on Trust & Trustworthy Computing (TRUST), 17-19 Jun 2013, United Kingdom (London)

Background User Space Kernel Space Operating System

Possible Solutions Rewriting OS Too costly to be practical Adopting new security-capable devices Compatibility Difficult to widely deploy Adopting hypervisor Without availability guarantee No secure user interface

Our Goals A lightweight and reliable hypervisor Small size Integrity and availability guarantee Secure user interface Demonstrate two practical security utilities based on Guardian.

Threat Model Untrusted guest OS Launch arbitrary code with kernel privilege Issue any possible DMA requests Trusted BIOS and firmware Trusted hardware No physical attacks Security-conscious end users

Design Rationale Small size Bare-metal hypervisor - Guardian Integrity and availability guarantee Secure Boot and Shutdown (SBS) Secure User Interface (SUI) BIOS services (bootup) and trusted path (runtime)

SBS Overview Power Up Guardian Boots up Backup TCB Runtime Restore TCB Power Down Guest Boots up Guest Shutdown Guardian Shutdown Time Line Backup Disk Restore Hypervisor Space Guest Space TCB image

Secure Boot TPM-based Secure Boot integrated into the secure boot sequence TCB: BIOS, Bootloader core, Guardian hypervisor

The Core of BootLoader Bootloader usually dynamically loads other (potentially malicious) modules

Secure Shutdown Intercept all shutdown events, and restore the TCB images Advanced Configuration and Power Interface (ACPI) sleep Intercept the sleep and control registers System reboot CPU INIT-IPI interrupt interception

TCB Images Backup/Restore TCB images are bootloader core and Guardian image The images are protected in a reserved memory at runtime Use EPT/NPT Raw disk I/O Not need file system Reuse bootloader s functionality Hypervisor Space Guest Space

Recovery The recovery mechanism is used when system crashes E.g., Power failure Boot up from a trusted-storage CD, read-only USB-token Restore the TCB images Restore the TCB images to the disk Reuse bootloader s functionality

Secure User Interface Boot Up Secure User Interface(BUSUI) Bootup phase Built upon BIOS services Run Time Secure User Interface (RTSUI) Runtime phase Based on the trusted path Keyboard -> Guardian -> Monitor

Implementation Experiment setup Dell OptiPlex 990 MT desktop Intel(R) Core (TM) i7-600cpu, 3.40GHz processor 4GB main memory USB Logitech web camera with EHCI host controller Intel Corporation 82579LM Gigabit Network Card

Lines of Source Code (K) Guardian Implementation Guardian 25K SLOC 500 400 300 200 100 0 Blue: Hypervisor code Red: Other TCB code Trusted Computing Base (TCB)

Two Security Utilities Device Monitoring Camera control Monitoring if the web camera is open without user s consent Hyper-Firewall Both application-level and OS-level firewalls can be disabled by rootkits Packet-level filter in the hypervisor space Not need NIC driver, while intercepting critical registers to locate the cycle buffer and packet buffer

Hyper-firewall

Performance Evaluation Device Monitoring has no effect on the camera s performance at runtime No runtime data transferring interception Hyper-Firewall

System Benchmarks Virtualization effects on CPU and I/O

Conclusions Guardian, as lightweight and reliable security foothold Small size Integrity and availability guarantee Secure user interface Two practical security services Device monitoring Hyper-firewall Insignificant performance overhead

Guardian: Hypervisor As Security Foothold for Personal Computers