40
Virtualization Technology Recently Rookit with Virtualization Technology Maple(www.Wowhacker.co m)

Virtualization Technology

  • Upload
    tallis

  • View
    58

  • Download
    2

Embed Size (px)

DESCRIPTION

Virtualization Technology. Recently Rookit with Virtualization Technology. Maple(www.Wowhacker.com). Virtualization Technology. Emulation Full-Virtualization Para-Virtualization Hardware-Assistant Virtualization NOW! . Emulation. Emulation. Full-Virtualization. Full-Virtualization - PowerPoint PPT Presentation

Citation preview

Page 1: Virtualization Technology

Virtualization Technology

Recently Rookit with Virtual-ization Technology

Maple(www.Wowhacker.com)

Page 2: Virtualization Technology

Virtualization Technology• Emulation

• Full-Virtualization

• Para-Virtualization

• Hardware-Assistant Virtualization– NOW!

Page 3: Virtualization Technology

Emulation• Emulation

Page 4: Virtualization Technology

Full-Virtualization• Full-Virtualization

– Using Binary Translation: User 레벨의 요청은 바로 수행 .: OS 레벨의 요청은 Binary Tranlation 을 거쳐

VMM 이 담당한다 .

Page 5: Virtualization Technology

Para-Virtualization• Para-Virtualization

– OS 를 수정하여 , Systemcalls -> Hypercalls : Binary Translation 을 거치지 않아 비교적 빠르다 . : User 요청은 여전히 바로 수행된다 .

Page 6: Virtualization Technology

Hardware-Assist Virtualiza-tion

• AMD Pacifica– Focus on SKINIT

• INTEL VT-X– Focus on SENTER

Page 7: Virtualization Technology

What is Hardware-Assist Virtualization

• Root / Non-Root Mode

• VMM ( Virtual Machine Monitor )• VMCB in AMD, VMCS in INTEL

» Virtual Machine(guest)’s descriptorInclude following things :

1. guest 에게서 가로챌 명령이나 이벤트 리스트 ( 예 .write to CR3)2. guest 의 실행 환경을 타나내는 다양한 제어 비트들이나 guest code 가 수행되기 전에 취해질 특별한 동작들에 대한 비트등3. Guest 프로세서 상태 ( control register 등등 .. )

• I/O support by Architecture• External Access Protection ( eg., DMA )

Page 8: Virtualization Technology

How work Hardware-Assist Virtualiza-tion

• Setup VMCB or VMCS– Include Intercept instruction list See Architecture vendor’s reference manual

• VMRUN or VMLAUNCH– Into the Guest mode( Virtual Machine )– Execute Guest’s Code

• #VMEXIT – Back to Host mode( Real Machine )– Execute Host’s Code

» Intercepted Event or Interrupt dispatch

Page 9: Virtualization Technology

So, What?

Page 10: Virtualization Technology

RING -1

HVM RootkitBluepill Project

Page 11: Virtualization Technology

What is HVM

• HVM = Hardware-assisted virtualization

Page 12: Virtualization Technology

BLUEPILL

Page 13: Virtualization Technology

Hardware-Assist meansNormalUsage

Page 14: Virtualization Technology

Back to The Matrix

Page 15: Virtualization Technology

BLUEPILL Argorithm -1

Page 16: Virtualization Technology

BLUEPILL Argorithm -2

Page 17: Virtualization Technology

How to Solve?

• AMD – Secure Virtual Machine Architecture (SVM)

• INTEL – Trust Execution Technology (TXT)

With TPM ( Trusted Platform Module )

Page 18: Virtualization Technology

INTEL TXT Overview

Page 19: Virtualization Technology

TPM Overview

Page 20: Virtualization Technology

INTEL TXT with TPM

Page 21: Virtualization Technology

RING -2

SMM Rootkit

Page 22: Virtualization Technology

What is SMM

System Management Mode

일반적인 모든 실행 ( 운영 체제를 비롯 ) 을 일시 중단하고 구별된 특별한 소프트웨어 ( 보통 펌웨어나 하드웨어 보조 디버거) 가 높은 권한으로 실행된다 .

Page 23: Virtualization Technology

Normal SMM case

Page 24: Virtualization Technology

SMM layout of past

Page 25: Virtualization Technology

Processor’s View DRAM

4GB

5GB

SMRAM

MMIO

Current Layout

Page 26: Virtualization Technology

Processor’s View DRAM

4GB

5GB

SMRAM

MMIO SMRAM

Possible in Q35

Memory Remapping Bug

Not Availiable

Page 27: Virtualization Technology

Hypervisor with SMM

Hypervisor (VMM) STM ( SMM Transfer Monitor )

SMM

CommunicationProtocol

SMI

SVM&TXT

Page 28: Virtualization Technology

RING -3

AMT with INTELAnother is Noway

Page 29: Virtualization Technology

What is AMTAMT

Active Management Technology

Page 30: Virtualization Technology

AMT Example• Setup enable for AMT

Page 31: Virtualization Technology

AMT Example

Page 32: Virtualization Technology
Page 33: Virtualization Technology
Page 34: Virtualization Technology
Page 35: Virtualization Technology
Page 36: Virtualization Technology

Security With Hypervisor

The GOD observe you

Page 37: Virtualization Technology

Security With Hypervisor

The HypervisorCan

Do all-thingEg., I/O control

Network filteringDenied untrusted software

, and so on…

Page 38: Virtualization Technology

Security With Hypervisor

Can't feel Like the people

that living in MatrixEg., Jangja is navi in the dream.

We call that HOJUBMONG

Page 39: Virtualization Technology

ImagineHypervisor

ForSecurity

Real-Storage

OS

Virtual-Storage

Virtual-De-vices

NETWORK

Page 40: Virtualization Technology

END감사감사