virtual machine security systems

22
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash

Upload: dane

Post on 06-Jan-2016

40 views

Category:

Documents


1 download

DESCRIPTION

Virtual Machine Security Systems. Xin Zhao, Kevin Borders, Atul Prakash. Presented by Long Song 08/01/2013. Introduction. A virtual machine (VM) is a software based computer separate from the physical computer running in the machine, often called the host. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Virtual Machine Security Systems

Virtual Machine Security Systems

Presented by

Long Song08/01/2013

Xin Zhao, Kevin Borders, Atul Prakash

Page 2: Virtual Machine Security Systems

Introduction• A virtual machine (VM) is a software based computer

separate from the physical computer running in the machine, often called the host.

• A virtual machine (VM) is a logical process (most often an operating system) that interfaces with emulated hardware

and is managed by an underlying control program.

• The Virtual Machine runs programs in a Bytecode Interpreter.

Page 3: Virtual Machine Security Systems

Overview of Virtual Machine Technology

• Virtual machines have been in existence since the mid 1970’s.

• Originally, virtual machines were run on mainframes to provide resource multiplexing and isolation.

• Most modern virtual machine systems use the virtual machine monitor (VMM) model for managing and controlling individual virtual machines.

Page 4: Virtual Machine Security Systems

Virtual Machine Types

• Type I Lowest layer of software is VMM

E.g., Xen, VAX VMM, etc.

• Type II Runs on a host operating system

E.g., VMWare, JVM, etc.

Page 5: Virtual Machine Security Systems
Page 6: Virtual Machine Security Systems

Security Benefits

• Abstraction

• Isolation

• State Restore

• Transience

• External Monitoring

Page 7: Virtual Machine Security Systems

Abstraction• VMs abstract the hardware layer and each VM is

allocated its own strictly bounded resources. This layer of abstraction provides additional security. When an attacker gains access to the hardware layer, they have full control over the computer. OSs restrict hardware access by abstracting the hardware details, which is why you can run the same OS on two machines with different hardware configurations. In other words, the OS interfaces directly with the hardware so that programmers and hackers cannot. VMs create a complete hardware and OS abstraction. A program run locally on a physical machine knows what OS it is running on.

Page 8: Virtual Machine Security Systems

Abstraction of Physical Resources

Page 9: Virtual Machine Security Systems

Isolation

• The hypervisors segment physical resources into isolated entities and allow each guest OS to run independently. An attack on the VM should not affect any of the other VMs on the server or the host OS. This is unlike a multi-user OS, where all users can be affected by an attack.

Page 10: Virtual Machine Security Systems

State Restore

• VMs are touted for their ability to restore to a previous state. The contents of the virtual disk for each VM are usually stored as a file on the host.

• Besides being a convenience, state restore helps to ensure data integrity and provides perfect virus removal.

Page 11: Virtual Machine Security Systems

Transience

• One often-overlooked security feature of VMs is their ability to be started remotely, which allows them to be turned on and made available only when needed.

Page 12: Virtual Machine Security Systems

External Monitoring

• Since VMs run on a subset of hardware resources, it is possible to observe VM resource usage and detect malicious software from outside the VM. Physical installations of OSs usually rely on installed virus protection.

Page 13: Virtual Machine Security Systems

Security Maintenance

• VM Sprawl

• Unique Configurations

• State Restore

• Transience

Page 14: Virtual Machine Security Systems

Security Vulnerabilities

• Mobility

• Hypervisor Intrusion

• Hypervisor Modification

• Communication

• Denial of Service

Page 15: Virtual Machine Security Systems

Mobility

• Virtual machines are inherently not physical, which means their theft can take place without physical theft of the host machine. The contents of the virtual disk for each VM are stored as a file by most hypervisors, which allows VMs to be copied and run from other physical machines.

Page 16: Virtual Machine Security Systems

Hypervisor Intrusion

• The hypervisor provides the abstraction and resource allocation between the host and guests.

• The hypervisor is a program, running on the host, so if it is compromised, all VMs it controls and the host itself are accessible to the attacker.

Page 17: Virtual Machine Security Systems

Hypervisor Modification

• It does not matter how secure the original hypervisor is if it can be externally modified to use the attacker’s software. One attack of this form is known as Virtual Machine Based Root Kits (VMBR).

Page 18: Virtual Machine Security Systems

Communication

• VM Communication can be used for “guest-to-guest” attacks, in which attackers use one VM to access or control other VMs on the same hypervisor. These attacks can happen with or without compromising the hypervisor layer.

• A malicious VM can potentially access other VMs through shared memory, network connections, and other shared resources.

Page 19: Virtual Machine Security Systems

VM Communication Attack on VM2 and VM3

Page 20: Virtual Machine Security Systems

Denial of Service

• DoS attacks are a threat to all servers, however an improperly configured hypervisor can allow a single VM to consume all resources, thus starving any other VM running on the same physical machine.

Page 21: Virtual Machine Security Systems

Reference

• http://www.cs.wustl.edu/~jain/cse571-09/ftp/vmsec.pdf• http://courses.cs.vt.edu/~cs5204/fall07-kafura/Papers/

Virtualization/VMM-Security.pdf• http://www.cse.psu.edu/~tjaeger/cse497b-s07/slides/cse497b-

lecture-26-virtualmachine.pdf• http://en.wikipedia.org/wiki/Virtual_machine• X. Jiang and D. Xu. Collapsar: A vm-based architecture for

network attack detention center.

In USENIX Security Symposium, pages 15–28. 2004.

Page 22: Virtual Machine Security Systems

Thank You