Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Who watches the watcher? Detecting hypervisor introspection from unprivileged guests

Published: 01 July 2018 Publication History

Abstract

We present research on the limitations of detecting atypical activity by a hypervisor from the perspective of a guest domain. Individual instructions which have virtual machine exiting capability were evaluated, using wall timing and kernel thread racing as metrics. Cache-based memory access timing is performed with the Flush + Reload technique. Analysis of the potential methods for detecting non-temporal memory accesses are also discussed. It is found that a guest domain can use these techniques to reliably determine whether instructions or memory regions are being accessed in manner that deviates from normal hypervisor behavior.

References

[1]
M. Brengel, M. Backes, C. Rossow, Detecting Hardware-assisted Virtualization, in: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2016, pp. 207–227.
[2]
A. Dinaburg, P. Royal, M. Sharif, W. Lee, Ether: malware analysis via hardware virtualization extensions, in: Proceedings of the 15th ACM Conference on Computer and Communications Security, ACM, 2008, pp. 51–62.
[3]
C. Disselkoen, D. Kohlbrenner, L. Porter, D. Tullsen, Prime+abort: a timer-free high-precision l3 cache attack using intel tsx, in: 26th USENIX Security Symposium (USENIX Security 17), (Vancouver, BC), 2017, pp. 51–67.
[4]
P. Ferrie, Attacks on More Virtual Machine Emulators, Symantec Technology Exchange, 2007, p. 55.
[5]
H. Fritsch, Analysis and Detection of Virtualization-based Rootkits, Munchen: Technische Universitat, 2008.
[6]
Q. Ge, Y. Yarom, D. Cock, G. Heiser, A survey of microarchitectural timing attacks and counter measures on contemporary hardware, J. Cryptographic Eng. (2016) 1–27.
[7]
D. Gruss, C. Maurice, K. Wagner, S. Mangard, Flush+flush: a fast and stealthy cache attack, in: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2016, pp. 279–299.
[8]
Intel, Architecture Instruction Set Extensions and Future Features Programming Reference, 2018, https://software.intel.com/sites/default/files/managed/c5/15/architecture-instruction-set-extensions-programming-reference.pdf.
[10]
T.K. Lengyel, S. Maresca, B.D. Payne, G.D. Webster, S. Vogl, A. Kiayias, Scalability, fidelity and stealth in the drakvuf dynamic malware analysis system, in: Proceedings of the 30th Annual Computer Security Applications Conference, ACM, 2014, pp. 386–395.
[14]
G. Pék, B. Bencsáth, L. Buttyán, Nether: In-guest detection of out-of-the-guest malware analyzers, in: Proceedings of the Fourth European Workshop on System Security, ACM, 2011, p. 3.
[15]
R. Quinn, Detection of Malware via Side Channel Information, State University of New York at Binghamton, 2012.
[16]
J. Rutkowska, Red Pill: Detect Vmm Using (Almost) One Cpu Instruction, 2004, http://invisiblethings.org/papers/redpillhtml.
[17]
J. Rutkowska, Introducing Blue Pill’, the Official Blog of the Invisiblethings Org, vol. 22, 2006, p. 23.
[18]
J. Rutkowska, R. Wojtczuk, Preventing and Detecting Xen Hypervisor Subversions, Blackhat Briefings, USA, 2008.
[19]
Thompson, C., Huntley, M. and Link, C. [n.d.], ‘Virtualization detection: New strategies and their effectiveness’. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.302.7877&rep=rep1&type=pdf
[20]
D.A.D. Zovi, Hardware Virtualization Rootkits, Black Hat 2006, 2006, August.

Cited By

View all
  • (2024)Simulating the Network Environment of Sandboxes to Hide Virtual Machine Introspection PausesProceedings of the 17th European Workshop on Systems Security10.1145/3642974.3652280(1-7)Online publication date: 22-Apr-2024
  • (2023)RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its AnalysisProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627197(677-690)Online publication date: 4-Dec-2023
  • (2023)Retrofitting AMD x86 Processors with Active Virtual Machine Introspection CapabilitiesArchitecture of Computing Systems10.1007/978-3-031-42785-5_12(168-182)Online publication date: 13-Jun-2023
  • Show More Cited By

Index Terms

  1. Who watches the watcher? Detecting hypervisor introspection from unprivileged guests
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Digital Investigation: The International Journal of Digital Forensics & Incident Response
        Digital Investigation: The International Journal of Digital Forensics & Incident Response  Volume 26, Issue S
        Jul 2018
        141 pages

        Publisher

        Elsevier Science Publishers B. V.

        Netherlands

        Publication History

        Published: 01 July 2018

        Author Tags

        1. Virtualization
        2. Hypervisors
        3. Virtual machine monitors
        4. Cloud computing
        5. Wall timing
        6. Caches
        7. Side-channel attacks
        8. Non-temporal instructions

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 02 Oct 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Simulating the Network Environment of Sandboxes to Hide Virtual Machine Introspection PausesProceedings of the 17th European Workshop on Systems Security10.1145/3642974.3652280(1-7)Online publication date: 22-Apr-2024
        • (2023)RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its AnalysisProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627197(677-690)Online publication date: 4-Dec-2023
        • (2023)Retrofitting AMD x86 Processors with Active Virtual Machine Introspection CapabilitiesArchitecture of Computing Systems10.1007/978-3-031-42785-5_12(168-182)Online publication date: 13-Jun-2023
        • (2021)RapidVMI: Fast and multi-core aware active virtual machine introspectionProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3465752(1-10)Online publication date: 17-Aug-2021

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media