CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N
Total Page:16
File Type:pdf, Size:1020Kb
CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N. Gutierrez Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 47907-2086 DECEPTIVE MEMORY SYSTEMS ADissertation Submitted to the Faculty of Purdue University by Christopher N. Gutierrez In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2017 Purdue University West Lafayette, Indiana ii THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL Dr. Eugene H. Spa↵ord, Co-Chair Department of Computer Science Dr. Saurabh Bagchi, Co-Chair Department of Computer Science Dr. Dongyan Xu Department of Computer Science Dr. Mathias Payer Department of Computer Science Approved by: Dr. Voicu Popescu by Dr. William J. Gorman Head of the Graduate Program iii This work is dedicated to my wife, Gina. Thank you for all of your love and support. The moon awaits us. iv ACKNOWLEDGMENTS Iwould liketothank ProfessorsEugeneSpa↵ord and SaurabhBagchi for their guidance, support, and advice throughout my time at Purdue. Both have been instru mental in my development as a computer scientist, and I am forever grateful. I would also like to thank the Center for Education and Research in Information Assurance and Security (CERIAS) for fostering a multidisciplinary security culture in which I had the privilege to be part of. Special thanks to Adam Hammer and Ronald Cas tongia for their technical support and Thomas Yurek for his programming assistance for the experimental evaluation. I am grateful for the valuable feedback provided by the members of my thesis committee, Professor Dongyen Xu, and Professor Math ias Payer. I am thankful for the financial support provided by the National Science Foundation, under award number 1548114. Personal thanks to my Mom, Dad, and Grandma for instilling me the value of hard work and supporting my passion for computing at an early age. Thank you for allowing me to forgo a year of birthday and Christmas gifts for my first computer. A heartfelt thank you to my wife, Gina, for her unwavering support throughout my time as a graduate student. Thanks to Je↵ Avery, Paul Wood, Mohammed Almeshekah, Oyindamola Oluwatimi, and Abram Magner for their valuable feedback and support. Thank you to all of my colleagues in the Dependable Computing Systems Laboratory for their comments on the preliminary results. To all of my friends and family who have shown me nothing but love, I thank you. Finally, huge thanks to my cat Buntu for making me laugh and smile every day. v TABLE OF CONTENTS Page LIST OF TABLES ................................ viii LIST OF FIGURES ............................... ix ABSTRACT ................................... xi 1 INTRODUCTION .............................. 1 1.1 Thesis Statement ............................ 3 1.2 DecMS Goals .............................. 4 1.2.1 Preserve ............................. 4 1.2.2 Impede .............................. 5 1.2.3 Reduce .............................. 5 1.2.4 Identify ............................. 6 1.3 Contributions .............................. 6 2 BACKGROUND AND RELATED WORK ................. 8 2.1 Digital Assets to Protect ........................ 9 2.2 Threat Space .............................. 11 2.3 Data Destruction Methods ....................... 13 2.3.1 Delete .............................. 13 2.3.2 Secure Delete .......................... 14 2.3.3 Data Replacement ....................... 16 2.3.4 Transformation ......................... 17 2.4 Data Destruction in Anti-Forensics .................. 17 2.5 Defending Against Unauthorized Data Destruction ......... 18 2.5.1 Access Control ......................... 18 2.5.2 Data Preservation Strategies .................. 20 2.5.3 Data Recovery and Repair ................... 25 2.5.4 Unauthorized Destruction Detection Strategies ........ 28 2.5.5 Combining Detection and Preservation ............ 30 2.6 Deception for Defense .......................... 32 2.7 Other Related Work .......................... 38 3 THREATS AND DECEPTION ....................... 42 3.1 Threat Model and Assumptions .................... 43 3.1.1 Wiper Malware Threats on Integrity ............. 45 3.1.2 Anti-Forensics Threats to Availability and Utility ...... 46 3.1.3 Anti-Forensics Threats to Authenticity ............ 47 vi Page 3.1.4 Crypto Ransomware Threats to Authenticity ......... 49 3.1.5 Benign User ........................... 50 3.1.6 Assumptions ........................... 50 3.2 Planning Deception ........................... 51 3.2.1 Strategic Goal .......................... 51 3.2.2 Adversary Reaction ....................... 52 3.2.3 Attacker Bias .......................... 52 3.2.4 Deceptive Components ..................... 53 3.2.5 Feedback Channels and Monitoring .............. 58 3.2.6 Risks and Countermeasures .................. 59 3.3 Cost of Deception ............................ 60 3.3.1 Types of Systems ........................ 63 3.3.2 Cost Impact of Deception on Systems ............. 65 4 ARCHITECTURE AND DESIGN SPACE ................. 70 4.1 DecMS Integration Location ...................... 70 4.1.1 User-Level ............................ 72 4.1.2 Kernel-Level ........................... 74 4.1.3 Hardware-Level ......................... 76 4.1.4 VM-Level ............................ 78 4.1.5 Networking-Level ........................ 80 4.1.6 Summary ............................ 81 4.2 DecMS Integration Methods ...................... 83 4.2.1 Modification ........................... 85 4.2.2 Introspection .......................... 86 4.2.3 Interposition ........................... 87 4.2.4 Wrapper ............................. 88 4.3 Monitoring Methods and Policy .................... 89 4.3.1 Deception and Adversary Co-location ............. 90 4.3.2 Co-location with Protection .................. 90 4.3.3 Deception in External Layers ................. 91 4.3.4 Identification Methods ..................... 91 4.3.5 Policies and Components of DecMS .............. 91 4.4 Protection Methods and Policies .................... 93 4.4.1 Deception Policy ........................ 93 4.4.2 Preservation Policy ....................... 94 4.4.3 Other Protection Policies .................... 94 4.5 Summary of Integration Location ................... 94 5 PROOF OF CONCEPT DESIGN ...................... 96 5.1 Desired Traits .............................. 96 5.1.1 Identification .......................... 96 5.1.2 Impedance ............................ 97 vii Page 5.1.3 Preservation ........................... 97 5.1.4 Reduce .............................. 98 5.2 Threat Instances ............................ 98 5.2.1 Ransomware ........................... 98 5.2.2 Wiper Malware ......................... 99 5.2.3 Anti-forensics .......................... 100 5.3 Randomness Classifier ......................... 102 5.3.1 Parameter Settings for Randomness Classifier ........ 105 5.3.2 Randomness Tests ....................... 105 5.3.3 Classification Training and Validation ............. 106 5.4 Other Destructive Patterns ....................... 107 5.5 Design Overview for DecMS-Kernel .................. 109 5.6 Design Overview for DecMS-VMI ................... 112 5.6.1 Assumptions ........................... 114 5.6.2 Requirements .......................... 115 6 EVALUATION ................................ 116 6.1 Kernel-Based Evaluation ........................ 116 6.1.1 Observation Policy and Service ................ 116 6.1.2 Analysis Policy and Service .................. 117 6.1.3 Preservation Policy and Service ................ 118 6.1.4 Deception Policy and Service ................. 119 6.1.5 Service Location ........................ 119 6.1.6 Metrics of Interest ....................... 119 6.1.7 Experimental Results ...................... 121 6.1.8 Discussion ............................ 125 6.2 VMI-based Evaluation ......................... 127 6.2.1 Observation Policy and Service ................ 129 6.2.2 Analysis Policy and Service .................. 132 6.2.3 Preservation Policy and Service ................ 134 6.2.4 Experimental Results ...................... 136 7 CONCLUSION ................................ 150 7.1 Summary ................................ 150 7.2 Shortcomings, Enhancements, and Future Work ........... 151 7.2.1 Counterdeception ........................ 152 7.2.2 Alternative Analysis Policy .................. 156 7.2.3 Other Limitations ........................ 158 7.3 Conclusion ................................ 160 LIST OF REFERENCES ............................ 161 A ADDITIONAL PERFORMANCE RESULTS ................ 171 VITA ....................................... 176 viii LIST OF TABLES Table Page 4.1 Summary of possible layers to monitor and preserve data under destruc tion. ..................................... 82 4.2 Methods to support the goals of a DecMS ................ 84 5.1 Wiper Malware samples for evaluation .................. 99 5.2 A list of secure delete methods considered in the evaluation of DecMS- VMI. .................................... 101 A.1 DecMS-VMI latency for 32 MiB files. ................... 174 A.2 DecMS-VMI latency for 4 KiB files. .................... 175 ix LIST OF FIGURES Figure Page 3.1 Threats and loss of Parkerian security elements for various data destruc tion attacks. ................................. 44 3.2 The costs of using deception on various systems. ............. 66 4.1 Possible layers of abstraction and monitoring methods for deception, based on [81, Chapters 5, 7]. ..........................