Things Lab • Security by Isolation • Open Source(GPL v2) • Based on Xen – So today I don't speak about bhyve – Wish I could supply some inspiration for you!
– Who forced Citrix to publish souces of XenClient – Published Blue Pill[SyScan'06] when she were in COSEINC • Blue Pill – VT based rootkit(hypervisor) • Previous rootkit were on Ring 0 – Hooking System Call – Altering Kernel Structure – So we can detect it
Para-Virtualization • Modify OS for virtualized environment • No need of full hardware emulation – Full-Virtualization • No need of modifying OS • Inturrupt – Xen uses event channnel – KVM uses MSI(-X)
KVM Gest-Physical memory space is part of host-virtual memory space of QEMU – Xen Mapping Gest-Physical memory space On demand • Both use HW-assisted virtualization – Intel VT, AMD-V
Dom0 manages other DomU – Only Privilege Domain is allowed to access all HW – DomU ask Dom0 to HW access via Backend/Frontend Driver • Qubes OS apply this architecture to security
enogh? – Address space isolation – User accounts isolation – ACL – Kernel/User space separation – chroot – systrace – SELinux – Secure level of BSD • They don't work in practice!
• We can create VM(Domain) depending on their Use – Work – Shopping – Personal • Domains are isolated each other → SECURE! • Created by Template VM(Read Only)
If compromised, there are no informations • Lightweight – 400MB per VM • Centrally Updatable • Each app gets a label (VM name + color frame) that is applied by the Window Manager running in Dom0
Get context of Guest OS from VMM – Encrypt pages at memory access – Show process to not-encrypted memory – Need original loader • SP3[Vee08] – Process memory encyption from VMM – Set accsess control per page – Has both encrypted page and not-encrypted page → Reduction of Overhead
Identity and Measurement • Establish Trust by RTM(Root of Trust for Measurement) – Reliable engine makes a measurement of integrity – Root of Trust → Chain of Trust
Static RTM – RTM is firmware – Building Chain of Trust from booting • Dynamic RTM – RTM is GETSEC[SENTER] instruction – Building Chain of Trust from executing instruction – SENTER enable DMA protection so we can protect VM! “Kill two birds with one stone”
sharing – File transfer via virtual disk • Cross VM vulnerability is easily targeted • Insert rootkit at LiveMigration[BlackHat DC08] • Cross VM Side Channel Attack[CCS12] – Estimate the access from another VM from response when malicious VM access physical cache continuously – Might steal the key
use • Seamless operation by GUI virtualization • DMA protection by Intel VT-d • Strage protection by Intel TXT • Filesystem protection by VM-specific key