Risk
4/29/2010
03:38 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Researchers Lock Down The Hypervisor

Prototype prevents 'Blue Pill' and other types of malware-injection attacks against the hypervisor

Researchers at North Carolina State University have come up with a tool that aims to eliminate one of the biggest risks to virtualization and cloud computing: attacks on the hypervisor. The so-called HyperSafe prototype blocks any new code -- think malware -- from getting into the hypervisor and restricts alterations to the hypervisor's code.

The NC State research, funded by the U.S. Army Research Office and the National Science Foundation, focused on using features in the underlying hardware to help armor the hypervisor against attacks. Xuxian Jiang, assistant professor of computer science at NC State and head of the research team that created HyperSafe, says the tool is integrated into the hypervisor itself, and that the research team used it on Xen and BitVisor hypervisors.

"Existing hypervisors, such as Xen and BitVisor, need to be modified or extended to include HyperSafe...which enables the hypervisor with self-protection from code-injection attempts," Jiang says. HyperSafe would theoretically block threats, such as Blue Pill and Vitriol -- hypervisor rootkits that inject malware into the hypervisor, he says.

The tool uses two techniques to secure the hypervisor: nonbypassable memory lockdown and restricted pointer-indexing. Nonbypassable memory lockdown basically blocks any new code from the hypervisor, except for code introduced by the system administrator. So if a user downloads malware that exploits a buffer overflow bug in a hypervisor, it can't be compromised, according to the research.

"It uses a hardware feature called WP to effectively lock down the memory range...that contains executable code. This memory range cannot be changed to include new additional code for execution in the hypervisor," Jiang says. "Also, this memory page is marked 'read-only' and existing code will not be modified."

Restricted pointer-indexing is basically a way that monitors any unusual behavior by the hypervisor to prevent changes to the hypervisor code, except by the administrator. "HyperSafe is designed to block [these types of attacks], even with the assumption that exploitable bugs are present in the hypervisor software," he says. "Considering the large and complex hypervisor code, we need to find a solution to thwart hypervisor-level code injection, which is the challenging part in HyperSafe."

But the technique doesn't prevent a rogue administrator from altering the hypervisor -- HyperSafe doesn't handle physical-level attacks.

The hypervisor defense techniques could protect against a virtual machine escape, for instance, where a compromised guest VM would be unable to attack the hypervisor. "The goal of HyperSafe is to address code-injection attacks at the hypervisor level," Jiang says.

Jiang says he and his team are working on expanding the tool to other hypervisors, and they aren't ruling out rolling the technology into commercial form: "At this stage, we are open for any possibilities, including a close collaboration with key players in the virtualization market to better secure the hypervisor software," he says.

HyperSafe assumes trusted hardware and only addresses threats from untrusted guest VMs, he says. He hopes to add support some hardware attacks in future research.

The hypervisor tool follows research Jiang and a team did last year on combating rootkits. They used a machine's own hardware-based memory protection to protect the operating system kernel from rootkits, developing the so-called HookSafe tool.

The tool prevents rootkits from even infiltrating the system, rather than having to find the stealthy code and clean it up, which is no easy task, according to the researchers.

Meantime, the NC State researchers will present their new HyperSafe research next month at the IEEE Symposium On Security And Privacy in Oakland, Calif. Their paper is called "HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity" (PDF).

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?