首页> 外文会议>ACM SIGSAC Conference on Computer and Communications Security >Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation
【24h】

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation

机译:挫败内存泄露,具有高效的虚拟机管理程序强制域域隔离

获取原文

摘要

Exploiting memory disclosure vulnerabilities like the Heart-Bleed bug may cause arbitrary reading of a victim's memory, leading to leakage of critical secrets such as crypto keys, personal identity and financial information. While isolating code that manipulates critical secrets into an isolated execution environment is a promising countermeasure, existing approaches are either too coarse-grained to prevent intradomain attacks, or require excessive intervention from low-level software (e.g., hypervisor or OS), or both. Further, few of them are applicable to large-scale software with millions of lines of code. This paper describes a new approach, namely SeCage, which retrofits commodity hardware virtualization extensions to support efficient isolation of sensitive code manipulating critical secrets from the remaining code. SeCage is designed to work under a strong adversary model where a victim application or even the OS may be controlled by the adversary, while supporting large-scale software with small deployment cost. SeCage combines static and dynamic analysis to decompose monolithic software into several compartments, each of which may contain different secrets and their corresponding code. Following the idea of separating control and data plane, SeCage retrofits the VMFUNC mechanism and nested paging in Intel processors to transparently provide different memory views for different compartments, while allowing low-cost and transparent invocation across domains without hypervisor intervention. We have implemented SeCage in KVM on a commodity Intel machine. To demonstrate the effectiveness of SeCage, we deploy it to the Nginx and OpenSSH server with the OpenSSL library as well as CryptoLoop with small efforts. Security evaluation shows that SeCage can prevent the disclosure of private keys from HeartBleed attacks and memory scanning from rootkits. The evaluation shows that SeCage only incurs small performance and space overhead.
机译:利用心脏出血错误的内存泄露漏洞可能导致受害者的记忆任意阅读,从而导致关键秘密泄露,例如加密钥匙,个人身份和财务信息。虽然将关键秘密分离到隔离的执行环境中的分离代码是一个很有希望的对策,但是现有方法是过于粗糙的,以防止局部攻击,或者需要从低级软件(例如,虚拟机管理程序或OS)或两者都过度干预。此外,其中很少有利用数百万个代码的大型软件。本文介绍了一种新的方法,即Secage,它改造了商品硬件虚拟化扩展,以支持从剩余代码中操纵关键秘密的敏感代码的有效隔离。 Secage旨在在一个强大的对手模型下工作,其中受害者应用程序或甚至操作系统可以由对手控制,同时支持具有小部署成本的大规模软件。 Secage将静态和动态分析结合起来将单片软件分解为多个隔间,每个隔间可能包含不同的秘密和它们的相应代码。在分离控制和数据平面的想法之后,SECAGE改进了VMFUNC机制,并在英特尔处理器中嵌套寻呼,以透明地为不同的隔间提供不同的存储器视图,同时允许在没有虚拟机管理程序干预的域中的低成本和透明调用。我们在商品英特尔机器上实施了KVM的Secage。为了展示SECAGE的有效性,我们将其部署到NGINX和OpenSSH服务器,并使用openssl库以及小费的Cryptoloop。安全性评估表明,Secage可以防止从rootkits中泄露攻击和内存扫描的私钥披露。评估表明,Secage只会引发小的性能和空间开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号