Lares: an Architecture for Secure Active Monitoring Using Virtualization

Lares: an Architecture for Secure Active Monitoring Using Virtualization

Lares: An Architecture for Secure Active Monitoring Using Virtualization Bryan D. Payne Martim Carbone Monirul Sharif Wenke Lee School of Computer Science Georgia Institute of Technology Atlanta, Georgia 30332–0765 bdpayne,mcarbone,msharif,wenke @cc.gatech.edu { } Abstract ing a full-featured anti-virus, intrusion detection, or intru- sion prevention system. Previous efforts to implement these Host-based security tools such as anti-virus and intru- types of systems within a protected VM have resorted to im- sion detection systems are not adequately protected on to- plementing the systems with crippled functionality. What day’s computers. Malware is often designed to immedi- was missing in these systems was the ability to do active ately disable any security tools upon installation, render- monitoring. Active monitoring is when the security tool ing them useless. While current research has focused on places a hook inside the system being monitored. When moving these vulnerable security tools into an isolated vir- execution reaches the hook, it will interrupt execution and tual machine, this approach cripples security tools by pre- pass control to the security tool. Active monitoring can also venting them from doing active monitoring. This paper de- be done outside of the system being monitored (e.g., net- scribes an architecture that takes a hybrid approach, giving work and disk monitoring), however these monitors are re- security tools the ability to do active monitoring while still stricted to the semantic level provided by the disk and net- benefiting from the increased security of an isolated virtual work device abstractions. In this work, we focus on systems machine. We discuss the architecture and a prototype im- that perform active monitoring at a higher semantic level by plementation that can process hooks from a virtual machine placing hooks in arbitrary kernel locations within the sys- running Windows XP on Xen. We conclude with a security tem being monitored. This type of monitoring is required to analysis and show the performance of a single hook to be support state-of-the-art security tools. 28 µsecs in the best case. Active monitoring is a hard problem in the types of vir- tualized security architectures used in recent research. The problem is that active monitoring requires security-critical 1 Introduction code inside untrusted VMs. Since a major reason for mov- As malware has become increasingly sophisticated over ing to a virtualized architecture is to remove security-critical the past several years, it is no longer unusual to see it dis- code from the untrusted VMs, this feels like a step back- able critical security services on a victim’s machine. Re- wards. Properly protecting this code is sufficiently chal- searchers responded to this threat by moving security ser- lenging that some researchers have attempted to avoid the vices into different virtual machines (VMs) [9]. Techniques problem altogether [13], resulting in systems that can only such as introspection make this possible by bridging the detect attacks, not prevent them. Furthermore, recent work semantic gap between the protected VM and other VMs has focused on providing strong protections for the entire running on the same platform. In particular, introspec- kernel code [32], but these do not protect kernel data so tion and related techniques have been used to build a wide they are insufficient for protecting entire applications. If range of security tools including intrusion detection sys- this were the end of the story, then security in virtualized tems, memory and disk integrity checkers, and system mon- architectures would be limited to passive monitoring and itors [14, 18, 22]. All of these tools share one thing in com- the resulting security tools would remain crippled. mon: each relies on passive monitoring. Passive monitoring This paper addresses the problem of secure active moni- is when the security tool monitors by external scanning or toring in a virtualized architecture. We show how the mon- polling. As a result, it is unable to guarantee interposition itoring mechanisms can be implemented and protected. We on events before they happen. do not consider new malware detection or prevention tech- This fundamental limitation of passive monitoring niques as these areas are orthogonal to the research pre- means that it is not a sufficient technique for implement- sented here. Any system that uses active monitoring, in- cluding any future advances in the field, can benefit from 2 provides the motivation and formal foundation for our the added protections that our work provides. The primary work. Section 3 provides details on our architecture and the research contribution of this work is an architecture to per- related design considerations. Section 4 describes our pro- form secure, active monitoring in a virtualized environment. totype implementation, including some implementation de- We show design techniques that allow installation of pro- tails that would be useful to anyone reproducing this work. tected hooks into an untrusted VM. These hooks will trap Sections 5 and 6 evaluate the security and performance of execution in the untrusted VM and transfer control to soft- our approach and discuss the security properties of our ar- ware in the protected VM. This architecture is generally ap- chitecture. Section 7 describes the related work. We con- plicable to any system that requires secure and active moni- clude with Section 8. toring, and it builds on prior work that described techniques for passively monitoring memory and file system data [22]. 2 Secure Monitoring Ensuring the security of this system is non-trivial. Our In this section we first look at previous approaches to design is a departure from traditional secure systems work perform secure host-based monitoring. These fall into two in that we place hooks inside the untrusted VM, without lay- main categories: passive virtualization-based approaches ering them directly on top of trusted code. By limiting the and malware analysis. We consider the benefits of and functionality of the code placed inside the untrusted VM drawbacks to these approaches and compare them to ac- and providing specialized protection mechanisms, we are tive monitoring. Next we provide a set of formal security able to ensure the security of this approach. The function- requirements for any active monitoring system. These re- ality removed from the untrusted VM is then implemented quirements are used to motivate our architectural decisions in a secure VM, so the overall functionality of the system is in Section 3. The section ends with a discussion of the threat not reduced. The protection mechanisms can be deployed model and assumptions used in designing our secure active as needed so that the system only uses more costly mecha- monitoring architecture. nisms when required. Using these techniques, we are able to thwart attempts by malware to disable security applica- 2.1 Previous Approaches tions that use our monitoring architecture. We provide a Virtualization technology has made it possible to provide complete security analysis of our architecture in Section 6. security services with better protection by isolating them Our architecture is designed for use in production sys- into separate, protected VMs. Research on techniques like tems. To meet the goals of this environment, our archi- memory and disk introspection [9, 22] have shown how to tecture is designed to prevent an attacker from disabling or leverage this isolation to securely monitor a system’s state. circumventing (i.e., bypassing) any security-critical compo- Memory introspection works by having a security domain nent. The design also allows hooks to be placed at arbitrary map the physical page frames of an untrusted domain into kernel locations and provides a low performance overhead. its own address space. It allows security applications to These three requirements guided the design of our system have complete visibility over another virtual machine’s raw architecture and are motivated by a set of formal require- memory state. Using introspection, higher-level code and ments we formulated to ensure the monitoring system is se- data structures can be semantically reconstructed to provide cure. Section 2.2 introduces these formal requirements. We an abstract view of the system’s state. Disk introspection discuss our architecture and its requirements in Section 3. works in a similar fashion, allowing security tools to ac- After designing the architecture, we implemented a pro- cess and infer the disk’s contents in a protected fashion. totype to show the viability of our approach. Commer- While introspection has many applications, it is fundamen- cial security applications will utilize hundreds of hooks, but tally limited because it can only perform passive monitor- each hook is constructed in a similar fashion. Our prototype ing. Therefore, introspection alone is not sufficient for ap- shows how the system would work by implementing one plications that rely on active monitoring, such as anti-virus hook that is triggered for each new process creation event. tools and host-based intrusion prevention systems. This hook is commonly seen in security applications, such Recent work on malware analysis [12,21,40] uses a form as anti-virus applications [35], and is representative of the of VM-based active monitoring to intercept and analyze the types of hooks these applications use. The prototype is built run-time behavior of malware in a controlled environment. on the Xen hypervisor using Windows XP in the untrusted Although active monitoring is an integral goal of such sys- VM and Fedora 7 in the secure VM. Our evaluation verifies tems, the requirements and usage scenarios of these systems the effectiveness of our memory protection techniques and and our system differ, making malware analysis approaches measures the time required to process a single hook to be unsuitable for use on production systems. 28 µsecs in the best case. We provide implementation and Malware analysis systems are primarily designed to evaluation details in Sections 4 and 5, respectively.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us