Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems∗

Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems∗

Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems∗ Arvind Seshadri Mark Luk Elaine Shi CMU/CyLab CMU/CyLab CMU/CyLab Adrian Perrig Leendert van Doorn Pradeep Khosla CMU/CyLab IBM CMU/CyLab ABSTRACT dispatcher communicates with the untrusted platform over a com- munication link, such as a network connection. After a successful We propose a primitive, called Pioneer, as a first step towards ver- invocation of Pioneer, the dispatcher obtains assurance that: 1) an ifiable code execution on untrusted legacy hosts. Pioneer does not arbitrary piece of code, called the executable, on the untrusted plat- require any hardware support such as secure co-processors or CPU- form is unmodified; 2) the unmodified executable is invoked for architecture extensions. We implement Pioneer on an Intel Pentium execution on the untrusted platform; and 3) the executable is ex- IV Xeon processor. Pioneer can be used as a basic building block ecuted untampered, despite the presence of malicious software on to build security systems. We demonstrate this by building a kernel the untrusted platform. rootkit detector. To provide these properties, we assume that the dispatcher knows Categories and Subject Descriptors: Software, Operating Sys- the hardware configuration of the untrusted platform, and that the tems, Security and Protection, Verification. untrusted platform cannot collude with other devices during verifi- General Terms: Security. cation. We also assume that the communication channel between Keywords: Verifiable Code Execution, Software-based Code At- the dispatcher and the untrusted platform provides the property of testation, Dynamic Root of Trust, Rootkit Detection, Self-check- message-origin authentication, i.e., the communication channel is summing Code. configured so that the dispatcher obtains the guarantee that the Pio- neer packets it receives originate from the untrusted platform. Fur- thermore, to provide the guarantee of untampered code execution, 1 INTRODUCTION we assume that the executable is self-contained, not needing to invoke any other software on the untrusted platform, and that it Obtaining a guarantee that a given code has executed untampered can execute at the highest processor privilege level with interrupts on an untrusted legacy computing platform has been an open re- turned off. search challenge. We refer to this as the problem of verifiable code execution. An untrusted computing platform can tamper with code The dispatcher uses Pioneer to dynamically establish a trusted execution in at least three ways: 1) by modifying the code before computing base on the untrusted platform, called the dynamic root invoking it; 2) executing alternate code; or 3) modifying execution of trust. All code contained in the dynamic root of trust is guar- state such as memory or registers when the code is running. anteed to be unmodified and is guaranteed to execute in an un- tampered execution environment. Once established, the dynamic In this paper, we propose a software-based primitive called Pi- root of trust measures the integrity of the executable and invokes oneer1 as a first step towards addressing the problem of verifiable the executable. The executable is guaranteed to execute in the un- code execution on legacy computing platform without relying on tampered execution environment of the dynamic root of trust. In secure co-processors or CPU architecture extensions such as virtu- Pioneer, the dynamic root of trust is instantiated through the verifi- alization support. Pioneer is based on a challenge-response proto- cation function, a self-checking function that computes a checksum col between an external trusted entity, called the dispatcher, and an over its own instructions. The checksum computation slows down untrusted computing platform, called the untrusted platform. The noticeably if the adversary tampers with the computation. Thus, if the dispatcher receives the correct checksum from the untrusted ∗This research was supported in part by CyLab at the Carnegie Mellon University un- der grant DAAD19-02-1-0389 from the Army Research Office, by NSF under grant platform within the expected amount of time, it obtains the guaran- CNS-0509004, and by a gift from IBM, Intel and Microsoft. The views and conclu- tee that the verification function code on the execution platform is sions contained here are those of the authors and should not be interpreted as neces- unmodified. sarily representing the official policies or endorsements, either express or implied, of ARO, Carnegie Mellon University, IBM, Intel, Microsoft, NSF, or the U.S. Govern- Pioneer can be used as a basic primitive for developing security ment or any of its agencies. applications. We illustrate this by designing a kernel rootkit de- 1We call our primitive Pioneer because it can be used to instantiate a trusted base on tector. Our rootkit detector uses a software-based kernel integrity an untrusted platform. monitor. Instead of using rootkit signatures or low level filesystem scans to find files hidden by a rootkit, our kernel integrity monitor Permission to make digital or hard copies of all or part of this work for computes periodic hashes of the kernel code segment and static data personal or classroom use is granted without fee provided that copies are structures to detect unauthorized kernel changes. The trusted com- not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to puter uses Pioneer to obtain a guarantee that the kernel integrity republish, to post on servers or to redistribute to lists, requires prior specific monitor is unmodified and runs untampered. When implemented permission and/or a fee. on version 2.6 of the Linux kernel, our rootkit detector was able SOSP’05,October 23–26, 2005,Brighton,UnitedKingdom. to detect all publically-known rootkits for this series of the Linux Copyright 2005 ACM 1-59593-079-5/05/0010 ...$5.00. kernel. 1 An important property of Pioneer is that it enables software- 2 PROBLEM DEFINITION, ASSUMPTIONS & based code attestation [21]. Code attestation allows a trusted en- ATTACKER MODEL tity, known as the verifier, to verify the software stack running on another entity, known as the attestation platform. The verifier and In this section, we describe the problem we address, discuss the the attestation platform are usually different physical computing assumptions we make, and describe our attacker model. devices. A measurement agent on the attestation platform takes integrity measurements of the platform’s software stack and sends 2.1 Problem Definition them to the verifier. The verifier uses the integrity measurements We define the problem of verifiable code execution, in which the obtained from the attestation platform to detect modifications in the dispatcher wants a guarantee that some arbitrary code has executed attestation platform’s software stack. untampered on an untrusted external platform, even in the presence The Trusted Computing Group (TCG) has released standards of malicious software on the external platform. for secure computing platforms, based on a tamper-resistant chip The untrusted platform has a self-checking function, called the called the Trusted Platform Module (TPM) [24]. The verifier can verification function. The dispatcher invokes the verification func- use the TPM on the attestation platform to obtain the guarantee of tion by sending a challenge to the untrusted platform. The verifica- load-time attestation, whereby the verifier obtains a guarantee of tion function returns a checksum to the dispatcher. The dispatcher what code was loaded into the system memory initially. All code has a copy of the verification function and can independently verify is measured before it is loaded and the measurements are stored in- the checksum. If the checksum returned by the untrusted platform side the TPM. In response to an attestation request, the attestation is correct and is returned within the expected time, the dispatcher platform sends the load-time measurements to the verifier. obtains the guarantee that a dynamic root of trust exists on the un- trusted platform. The code in the dynamic root of trust measures the The SHA-1 hash function is used as the measurement agent in executable, sends the measurement to the dispatcher, and invokes TCG. The collision resistance property of SHA-1 has been compro- the executable. The executable runs in an untampered execution mised [25]. The adversary can exploit this vulnerability to create environment, which was set up as part of instantiating the dynamic a good version and a malicious version of an executable with the root of trust. The dispatcher can verify the measurement since it same hash value. The adversary can then undetectably exchange has a copy of the executable. Taken together, the correctness of the the good copy of the executable with the malicious copy on the checksum and correctness of the executable measurement provide attestation platform. After obtaining the load-time measurements the guarantee of verifiable code execution to the dispatcher. from the attestation platform, the verifier believes that the attes- Even if malicious software runs on the untrusted platform, it can- tation platform loaded the good copy of the executable. In real- not tamper with the execution of the executable. The adversary ity, the attestation platform has loaded the malicious copy. Hence, can perform an active DoS attack and thwart Pioneer from being the load-time attestation guarantee provided by TCG does not hold run at all. However, the adversary cannot cheat by introducing a anymore. Also, other systems that rely on the load-time attestation false negative, where the correct checksum value has been reported provided by TCG such as Terra, Intel’s LaGrande Technology and within the expected time to the dispatcher, without the correct code AMD’s Pacifica are compromised as well [4, 11, 12]. executing on the untrusted platform. It is not possible to update the TCG measurement agent using 2.2 Assumptions software methods.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    16 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us