subverting operating system properties through evolutionary...

22
Subverting Operating System Properties through Evolutionary DKOM Attacks Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti Cisco Systems, Inc. Universita’ degli Studi di Milano Eurecom DIMVA 2016 San Sebastian, Spain

Upload: others

Post on 14-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

Subverting Operating System Properties through Evolutionary DKOM Attacks

Mariano  Graziano,  Lorenzo  Flore,  Andrea  Lanzi,  Davide  Balzarotti  

Cisco  Systems,  Inc.  Universita’  degli  Studi  di  Milano  

Eurecom  

DIMVA  2016  -­‐  San  Sebastian,  Spain  

Page 2: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

TRADITIONAL DKOM ATTACKS

EPROCESS EPROCESS EPROCESS

Page 3: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

TRADITIONAL DKOM ATTACKS

EPROCESS

EPROCESS

EPROCESS

Page 4: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

TRADITIONAL DKOM DEFENSES

‣ Kernel data integrity solutions: ‣ invariants

‣ external systems ‣ memory analysis

‣ data partitioning

Page 5: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

EVOLUTIONARY DKOM ATTACKS

Time

data structure of interest

Page 6: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

EVOLUTIONARY DKOM ATTACKS

Vio la t ion o f a temporal property

Page 7: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

EVOLUTIONARY DKOM ATTACKS

Vio la t ion o f a temporal property

the attack cannot b e d e t e c t e d looking at a single snapshot

Page 8: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

STATE VS PROPERTY

‣ Traditional DKOM affects the state and are discrete

‣ Evolutionary DKOM (E-DKOM) affects the evolution in time of a given property and are continuous

Page 9: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

THREAT MODEL

‣ Attacker has access to ring0

‣ Malicious code not detectable by current solutions

‣ Attacker cannot modify kernel code and attack the VMM

Page 10: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

EXAMPLE: L INUX CFS SCHEDULER

Page 11: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

SUBVERTING THE SCHEDULER

target

Page 12: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

SUBVERTING THE SCHEDULER

target

right most

Page 13: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

SUBVERTING THE SCHEDULER

target

right most

Set  targetvruntime  >  rightmostvruntime  

Page 14: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

SUBVERTING THE SCHEDULER

target

target

We affected the evolution of the data structure over time. We altered the scheduler property (fair execution).

Page 15: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

ATTACK EVALUATION

‣ Temporarily block an IDS or Antivirus

‣ Temporarily block Inotify

Page 16: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

DEFENSES?

‣ Reference monitor that mimics the OS property:

‣ OS specific

‣ Difficult to generalize

Page 17: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

DEFENSE FRAMEWORK

Page 18: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

DEFENSE FRAMEWORK

Page 19: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

DEFENSE FRAMEWORK

Page 20: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

OVERHEAD

Normal  operations Stress  test

Page 21: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

CONCLUSIONS

‣ New DKOM attack based on data structures evolution

‣ Experiment on the Linux CFS scheduler

‣ Defense solution based on hypervisor

‣ General mitigation/solution very hard

Page 22: Subverting Operating System Properties through Evolutionary …s3.eurecom.fr/slides/dimva16_graziano.slides.pdf · 2020-06-17 · DIMVA’2016’G’San’Sebastian,’Spain ... evolution

Mariano Graziano [email protected]

@emd3l

QUESTIONS?