Process Out-Grafting: an Efficient “Out-Of-VM” Approach for Fine

Process Out-Grafting: an Efficient “Out-Of-VM” Approach for Fine

Process Out-Grafting: An Efficient “Out-of-VM” Approach for Fine-Grained Process Execution Monitoring DeepaSrinivasan ZhiWang XuxianJiang DongyanXu NC State University NC State University NC State University Purdue University [email protected] [email protected] [email protected] [email protected] ABSTRACT 1. INTRODUCTION Recent rapid malware growth has exposed the limitations of Computer malware (e.g., viruses and trojans), in its seem- traditional in-host malware-defense systems and motivated ingly infinite evolution of functionality and forms, is one of the development of secure virtualization-based out-of-VM the largest threat that end users and enterprises are combat- solutions. By running vulnerable systems as virtual ma- ing daily. A recent report from McAfee [3] shows a rapidly chines (VMs) and moving security software from inside the exploding malware growth with new record numbers “ac- VMs to outside, the out-of-VM solutions securely isolate the complished” in the last year. Specifically, as highlighted in anti-malware software from the vulnerable system. However, the report, “McAfee Labs identified more than 20 million the presence of semantic gap also leads to the compatibil- new pieces of malware in 2010,”which translates into nearly ity problem in not supporting existing defense software. In 55,000 new malware samples discovered every day! More- this paper, we present process out-grafting, an architectural over, “of the almost 55 million pieces of malware McAfee approach to address both isolation and compatibility chal- Labs has identified and protected against, 36 percent of it lenges in out-of-VM approaches for fine-grained process-level was written in 2010!” This alarming trend reveals the dis- execution monitoring. Specifically, by relocating a suspect turbing fact that existing malware defenses fail to effectively process from inside a VM to run side-by-side with the out- contain the threat and keep up with the malware growth. of-VM security tool, our technique effectively removes the Especially, if we examine traditional anti-malware tools, semantic gap and supports existing user-mode process mon- they are typically deployed within vulnerable systems and itoring tools without any modification. Moreover, by for- could be the first targets once malware infect a computer warding the system calls back to the VM, we can smoothly system. In other words, though these traditional in-host continue the execution of the out-grafted process without tools are valuable in monitoring system behavior or detect- weakening the isolation of the monitoring tool. We have ing malicious activities (with their native access inside the developed a KVM-based prototype and used it to natively systems), they are fundamentally limited in their isolation support a number of existing tools without any modifica- capability to prevent themselves from being infected in the tion. The evaluation results including measurement with first place. To address that, researchers propose out-of-VM benchmark programs show it is effective and practical with approaches [8, 15, 20, 21, 30, 31, 37], which change the mal- a small performance overhead. ware defense landscape by leveraging recent advances of vir- tualization to run vulnerable systems as VMs and then mov- ing anti-malware tools from inside the systems to outside. Categories and Subject Descriptors By enlisting help from the underlying virtualization layer (or D.4.6 [Operating Systems]: Security and Protection - In- hypervisor), out-of-VM approaches can effectively overcome vasive Software the isolation challenge that encumbers traditional in-host approaches. However, by separating anti-malware software from the untrusted systems, they also naturally encounter General Terms the well-known semantic gap challenge: these anti-malware Security software or tools – as out-of-VM entities – need to monitor or semantically infer various in-VM activities. Keywords In the past several years, researchers have actively exam- ined this semantic-gap challenge and implemented a number Virtualization, Process Monitoring, Semantic Gap of introspection-based systems [12, 21] to mitigate it. For ex- ample, VMwatcher [21] proposes a guest view casting tech- nique to apply the knowledge of inner guest OS kernel, es- pecially the semantic definition of key kernel data structure Permission to make digital or hard copies of all or part of this work for and functionality, to bridge the semantic gap. Virtuoso [12] personal or classroom use is granted without fee provided that copies are aims to automate the process of extracting introspection- not made or distributed for profit or commercial advantage and that copies relevant OS kernel information (by monitoring the execu- bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific tion of an in-guest helper program) for the construction of permission and/or a fee. introspection-aware security tools. Though these systems CCS’11, October 17–21, 2011, Chicago, Illinois, USA. make steady progresses in bridging the semantic gap, the Copyright 2011 ACM 978-1-4503-0948-6/11/10 ...$10.00. gap still inevitably leads to a compatibility problem. In par- perspective, it is still logically running inside the production ticular, none of these introspection-based systems is compat- VM. In the meantime, as the suspect process physically runs ible with existing anti-malware software (including various inside the security VM, the monitoring overhead will not be system/process monitoring tools) that were designed to run inflicted to the production VM, thus effectively localizing within a host. Due to the lack of compatibility, significant ef- monitoring impact within the security VM. fort and advanced mechanisms [12, 21] are still needed to re- We have implemented a proof-of-concept prototype on engineer these tools and adapt them for different guest OSs. KVM/ Linux (version kvm-2.6.36.1) and tested it to out- This is especially concerning when fine-grained monitoring graft various processes from different VMs running either of individual processes requires intercepting a wide variety Fedora 10 or Ubuntu 9.04. We have evaluated it with a of events (e.g. user-library function calls or system calls) number of different scenarios, including the use of traditional and interpreting them meaningfully (e.g. to determine their process monitoring tools, i.e., strace/ltrace/gdb, to monitor arguments). Worse, these introspection-based solutions are an out-grafted process from another VM. Note that these sensitive to guest OS versions or variants and to some extent fine-grained process monitoring tools cannot be natively sup- fragile to any change or patch to the guest OS. As a result, ported if the semantic gap is not effectively removed. More- this compatibility problem severely limits the effectiveness over, we also show that advanced (hardware-assisted) mon- and the adoption of these out-of-VM approaches. itoring tools [26] can be deployed in the security VM to In this paper, we present process out-grafting, an archi- monitor a process in the production VM, while they may tectural approach that addresses both isolation and com- be inconvenient or even impossible to run inside the pro- patibility challenges for out-of-VM, fine-grained user-mode duction VM. The performance evaluation with a number of process execution monitoring. Similar to prior out-of-VM standard benchmark programs shows that our prototype im- approaches, out-grafting still confines vulnerable systems as plementation incurs a small performance overhead and the VMs and deploys security tools outside the VMs. How- monitoring overhead is largely confined within the security ever, instead of analyzing the entire VM on all running VM, not the production VM. processes, out-grafting focuses on each individual process The rest of the paper is organized as follows: we first for fine-grained execution monitoring. More importantly, present the system design in Section 2. We then describe our approach is designed to naturally support existing user- the implementation and evaluation in Sections 3 and 4, re- mode process monitoring tools (e.g., strace, ltrace, and gdb) spectively. We discuss possible limitations and explore fu- outside of monitored VMs on an internal suspect process, ture improvements in Section 5. Finally, we describe related without the need of modifying these tools or making them work in Section 6 and conclude the paper in Section 7. introspection-aware (as required in prior out-of-VM approaches). For simplicity, we use the terms“production VM”and“secu- 2. SYSTEM DESIGN rity VM” respectively to represent the vulnerable VM that contains a suspect process and the analysis VM that hosts 2.1 Goals and Assumptions the security tool to monitor the suspect process. To enable process out-grafting, we have developed two Process out-grafting is a virtualization-based approach that key techniques. Specifically, the first technique, on-demand advances current out-of-VM approaches for fine-grained process- grafting, relocates the suspect process on demand from the level execution monitoring. It is introduced to effectively production VM to security VM (that contains the process support existing user-mode process-level monitoring tools monitoring tool as well as its supporting environment). By while removing the inherent semantic gap in out-of-VM ap- doing so, grafting effectively brings the suspect process to proaches. To achieve that, we have three main design goals. the monitor for fine-grained monitoring, which leads to at least two important benefits: (1) By co-locating the suspect • Isolation Process out-grafting should strictly isolate process to run side-by-side with our monitor, the semantic process monitoring tools from the untrusted process. gap caused by the VM isolation is effectively removed. In In other words, the untrusted process will be architec- fact, from the monitor’s perspective, it runs together with turally confined without unnecessarily exposing moni- the suspect process inside the same system and based on its toring tools.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us