Download - Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

Transcript
Page 1: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

Subverting Operating System Properties through Evolutionary DKOM Attacks

Mariano  Graziano,  Lorenzo  Flore,  Andrea  Lanzi,  Davide  Balzarotti  

Cisco  Systems,  Inc.  Universita’  degli  Studi  di  Milano  

Eurecom  

DIMVA  2016  -­‐  San  Sebastian,  Spain  

Page 2: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

TRADITIONAL DKOM ATTACKS

EPROCESS EPROCESS EPROCESS

Page 3: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

TRADITIONAL DKOM ATTACKS

EPROCESS

EPROCESS

EPROCESS

Page 4: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

TRADITIONAL DKOM DEFENSES

‣ Kernel data integrity solutions: ‣ invariants

‣ external systems ‣ memory analysis

‣ data partitioning

Page 5: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

EVOLUTIONARY DKOM ATTACKS

Time

data structure of interest

Page 6: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

EVOLUTIONARY DKOM ATTACKS

Vio la t ion o f a temporal property

Page 7: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

EVOLUTIONARY DKOM ATTACKS

Vio la t ion o f a temporal property

the attack cannot b e d e t e c t e d looking at a single snapshot

Page 8: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

STATE VS PROPERTY

‣ Traditional DKOM affects the state and are discrete

‣ Evolutionary DKOM (E-DKOM) affects the evolution in time of a given property and are continuous

Page 9: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

THREAT MODEL

‣ Attacker has access to ring0

‣ Malicious code not detectable by current solutions

‣ Attacker cannot modify kernel code and attack the VMM

Page 10: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

EXAMPLE: L INUX CFS SCHEDULER

Page 11: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

SUBVERTING THE SCHEDULER

target

Page 12: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

SUBVERTING THE SCHEDULER

target

right most

Page 13: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

SUBVERTING THE SCHEDULER

target

right most

Set  targetvruntime  >  rightmostvruntime  

Page 14: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

SUBVERTING THE SCHEDULER

target

target

We affected the evolution of the data structure over time. We altered the scheduler property (fair execution).

Page 15: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

ATTACK EVALUATION

‣ Temporarily block an IDS or Antivirus

‣ Temporarily block Inotify

Page 16: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

DEFENSES?

‣ Reference monitor that mimics the OS property:

‣ OS specific

‣ Difficult to generalize

Page 17: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

DEFENSE FRAMEWORK

Page 18: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

DEFENSE FRAMEWORK

Page 19: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

DEFENSE FRAMEWORK

Page 20: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

OVERHEAD

Normal  operations Stress  test

Page 21: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

CONCLUSIONS

‣ New DKOM attack based on data structures evolution

‣ Experiment on the Linux CFS scheduler

‣ Defense solution based on hypervisor

‣ General mitigation/solution very hard

Page 22: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

Mariano Graziano [email protected]

@emd3l

QUESTIONS?