Title :
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Author :
de Oliveira, D.A.S. ; Wu, Felix S.
Author_Institution :
Dept. of Comput. Sci., Univ. of California at Davis, Davis, CA, USA
Abstract :
The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of virtualization. In this work we challenge this traditional model and propose a collaboration approach between a virtualization-aware operating system and a VM layer to prevent tampering against kernel code and data. Our integrity model is a relaxed version of Biba´s and the main idea is to have all attempted writes into kernel code and data segments checked for validity at VM level. The OS-VM collaboration bridges the semantic gap between tracing low integrity objects at OS-level (files, processes, modules, allocated areas) and architecture-level (memory and registers). We have implemented this approach in a proof-of-concept prototype and have successfully tested it against 6 rootkits (including a non-control data attack) and 4 real-world benign LKM/drivers. All rootkits were prevented from corrupting kernel space and no false positive was triggered for benign modules. Performance measurements show that the average overhead to the VM for the OS-VM communication is low (7%, CPU benchmarks). The greatest overhead is caused by the memory monitoring module inside the VM: 1.38X alone and 1.46X when combined with the OS-VM communication. For OS microbenchmarks the slowdown for the OS-VM communication was 1.16X on average.
Keywords :
groupware; operating system kernels; security of data; virtual machines; benign LKM/drivers; kernel code protection; low integrity object; noncontrol data attack; proof-of-concept prototype; virtual machine; virtualization aware collaborative operating system; Bridges; Collaboration; Collaborative work; Data security; Kernel; Operating systems; Protection; Registers; Virtual machining; Virtual manufacturing; collaboration; integrity; kernel code and data; operating system; rootkits; security; virtual machine;
Conference_Titel :
Computer Security Applications Conference, 2009. ACSAC '09. Annual
Conference_Location :
Honolulu, HI
Print_ISBN :
978-0-7695-3919-5
DOI :
10.1109/ACSAC.2009.49