Sunday, May 2, 2010

Researchers Lock Down The Hypervisor

Via DarkReading.com -

Researchers at North Carolina State University have come up with a tool that aims to eliminate one of the biggest risks to virtualization and cloud computing: attacks on the hypervisor. The so-called HyperSafe prototype blocks any new code -- think malware -- from getting into the hypervisor and restricts alterations to the hypervisor's code.

The NC State research, funded by the U.S. Army Research Office and the National Science Foundation, focused on using features in the underlying hardware to help armor the hypervisor against attacks. Xuxian Jiang, assistant professor of computer science at NC State and head of the research team that created HyperSafe, says the tool is integrated into the hypervisor itself, and that the research team used it on Xen and BitVisor hypervisors.

"Existing hypervisors, such as Xen and BitVisor, need to be modified or extended to include HyperSafe...which enables the hypervisor with self-protection from code-injection attempts," Jiang says. HyperSafe would theoretically block threats, such as Blue Pill and Vitriol -- hypervisor rootkits that inject malware into the hypervisor, he says.

The tool uses two techniques to secure the hypervisor: nonbypassable memory lockdown and restricted pointer-indexing. Nonbypassable memory lockdown basically blocks any new code from the hypervisor, except for code introduced by the system administrator. So if a user downloads malware that exploits a buffer overflow bug in a hypervisor, it can't be compromised, according to the research.

"It uses a hardware feature called WP to effectively lock down the memory range...that contains executable code. This memory range cannot be changed to include new additional code for execution in the hypervisor," Jiang says. "Also, this memory page is marked 'read-only' and existing code will not be modified."

[...]

But the technique doesn't prevent a rogue administrator from altering the hypervisor -- HyperSafe doesn't handle physical-level attacks.

The hypervisor defense techniques could protect against a virtual machine escape, for instance, where a compromised guest VM would be unable to attack the hypervisor. "The goal of HyperSafe is to address code-injection attacks at the hypervisor level," Jiang says.

No comments:

Post a Comment