Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities
نویسندگان
چکیده
Discovering vulnerabilities in operating system (OS) kernels and patching them is crucial for OS security. However, there is a lack of effective kernel vulnerability detection tools, especially for closed-source OSes such as Microsoft Windows. In this paper, we present Digtool, an effective, binary-code-only, kernel vulnerability detection framework. Built atop a virtualization monitor we designed, Digtool successfully captures various dynamic behaviors of kernel execution, such as kernel object allocation, kernel memory access, thread scheduling, and function invoking. With these behaviors, Digtool has identified 45 zero-day vulnerabilities such as outof-bounds access, use-after-free, and time-of-check-totime-of-use among both kernel code and device drivers of recent versions of Microsoft Windows, including Windows 7 and Windows 10.
منابع مشابه
Hardware Assisted OS Virtualization
Operating System-level virtualization, also known as a container, is an increasingly popular approach to isolating applications that use the same underlying OS kernel [2, 5–7]. Containers have recently gained popularity as the default back-end for Docker, an application packaging and distribution system used by companies including Google [3]. The purported reason to use containers over a hardwa...
متن کاملSecPod: a Framework for Virtualization-based Security Systems
The OS kernel is critical to the security of a computer system. Many systems have been proposed to improve its security. A fundamental weakness of those systems is that page tables, the data structures that control the memory protection, are not isolated from the vulnerable kernel, and thus subject to tampering. To address that, researchers have relied on virtualization for reliable kernel memo...
متن کاملKruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring
Kernel heap buffer overflow vulnerabilities have been exposed for decades, but there is still no practical countermeasure that can be applied to the OS kernel. Previous solutions either suffer from high performance overhead or compatibility problems with the existing kernel and hardware. In this paper, we present Kruiser, a concurrent kernel heap buffer overflow monitor. Unlike conventional met...
متن کاملDetecting Stack Based Kernel Information Leaks
The final publication is available at Springer via: http://dx.doi.org/10.1007/978-3-319-07995-0_32 Abstract. The Linux kernel has become widely adopted in the mobile devices and cloud services, parallel to this has grown its abuse and misuse by attackers and malicious users. This has increased attention paid to kernel security through the deployment of kernel protection mechanisms. Kernel based...
متن کاملHardware virtualization support for Afterburner/L4
Full virtualization of the IA32 architecture can be achieved using hardware support. The L4 microkernel has been extended with mechanisms to leverage Intel’s VT-x technology. This work proposes a user level virtual machine monitor that complements L4’s virtualization extensions and realizes microkernel-based full virtualization of arbitrary operating systems. A prototype implementation within t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017