1 / 23

Towards High-Assurance Hypervisors

Explore reasoning techniques for secure systems' assurance levels, including memory protection, cryptographic protocols, and design analysis. Investigate the security of hypervisors, such as SecVisor, compared to traditional operating systems.

rkendrick
Download Presentation

Towards High-Assurance Hypervisors

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Towards High-Assurance Hypervisors Jason Franklin Joint with Anupam Datta, Sagar Chaki, Ning Qu, Arvind Seshadri

  2. Overview • Goal: Develop techniques to reason about assurance level of secure systems • Security mechanisms include: • Memory protection and cryptographic protocols • Security properties include code or data integrity • Safety properties • Examples: OSes, hypervisors, and VMMs

  3. Analysis of Secure Systems • Design level analysis • Pros: Before implementation of possibly insecure design • Cons: May miss attacks in implementation • Techniques: • Logics and model checking • Implementation level analysis • Pros: Source code is closer to what is actually run • Cons: Much more complicated • Techniques: • Software model checking

  4. Traditional System Architecture … App. App. OS Hardware Tiny security hypervisor provides additional layer of protection, if hypervisor is secure Hypervisor-Protected Systems Hypervisor-Protected System Architecture … App. App. Protected OS Hardware

  5. Hypervisor Security Hypothesis • Claim: Hypervisors are easier to secure than traditional operating systems for two reasons: • Hypervisors can be written in few lines of code • They’re small. • Hypervisors expose a narrow interface • They’re simple. • Let’s test this hypothesis…

  6. Hardware State Memory Protection Mode = {Kernel, User} RWX RW Program Counter (IP) User Mem. R RX Physical Memory Device Exclusion Vector Kernel Code RW RW Kernel Data User Mode Kernel Mode Case Study: SecVisor Hypervisor • SecVisor security hypervisor (3K loc, 2 calls) • Only approved code executes with kernel privilege

  7. Outline • We model and analyze SecVisor’s design • Find and repair vulnerabilities • Verify security of repaired design • Extend verification to arbitrarily large model

  8. Hardware State Memory Protection Mode = {Kernel, User} RWX RW Program Counter (IP) User Mem. R RX Physical Memory Device Exclusion Vector Kernel Code RW RW Kernel Data User Mode Kernel Mode How SecVisor Works

  9. Hardware State Mode = {Kernel, User} Program Counter (IP) Physical Memory Device Exclusion Vector Modeling State in Murphi hardware_platform_t: record phy_mem : phy_mem_t; mode: bit; IP: word; DEV: dev_t; end; State 1 mode = K; IP = KC;

  10. Modeling Transitions in Murphi rule “Kernel Exit” hw.mode = KERNEL_MODE ==> setIP(USER_MEM); end; rule “Kernel Entry” hw.mode = USER_MODE ==> secvisor_kernel_entry(); end; Kernel Exit State 1 State 2 mode = K; IP = KC; mode = K; IP = UM; Kernel Entry

  11. SecVisor + Environment Kernel Key Adv MMU Phy. Mem. Code KPT Data SPT IOMMU Adversary SecVisor DEV

  12. 00: 00: 01: 01: 10: 10: Operational Behavior Kernel Write(0x00, “hello”); Write(0x01, “hello”); 0x01 = VA_to_HPA(0x00) Phy. Mem. KPT “hello” SPT MMU SecVisor Synch(KPT, SPT)

  13. Verification • Specify security property as invariant (holds in all states): • Let property P = (Mode = K  IP = KC) • Verify (Model M, State S, Property P) • Check property in state S • If property does not hold, then print counter-example and exit • If (more neighbors exist) • Verify (M, Neighbors(S), P) • else return VERIFIED Attacker Step State 1 State 2 mode = K; IP = KC; mode = K; IP = UM;

  14. Results of Verification • Initial verification failed: • Counterexamples identified two vulnerabilities: • Writable virtual alias attack • Approved page remapping attack MMU Write (A, mal.code) Kernel Mal. Code Phy. Mem Adv SecVisor KPT SPT W, A->KC Synch(KPT, SPT)

  15. Successful Verification • After adding checks in synchronization code, verification succeeded • No property violations found in small models

  16. Limitations of Small Models • We ran out of memory after 3 PTEs and 3 memory pages • Memory requirements grow exponentially (state explosion) • Do attacks exist when system has many more PTEs and memory pages? • Murphi can’t check realistically sized machine models • E.g., 2^20 memory pages and 2^20 PTEs in both KPT and SPT • Even if it could, what if attacker has 2^20 + 1?

  17. Adv Kernel KPT Process Template KPT PTE MMU X, KC R, KC SPT SecVisor Phy. Mem. To infinity and beyond! (sorta) • We prove SecVisor is secure with an arbitrarily large but finite number of PTEs and physical memory pages • Let’s look at SecVisor from different perspective

  18. Process Model Small Model Process Template Process Template Process Template Process Template X, KC X, KC X, KC X, KC R, KC R, KC R, KC R, KC Translate Reduce to … Translation to Small Model • Translate functional model to parameterized model • Mem. pages and PTEs become duplicated homogeneous processes • Prove template model is reducible to small model Functional Model Kernel PTE KPT PTE … PTE

  19. Process Template Process Template Process Template X, KC X, KC X, KC R, KC R, KC R, KC Simulation Theorem S. W. Thm Extending Small World Verification • Small World Theorem: If security property P is violated in process model with arbitrarily large (but finite) number of processes then it will be violated in small model. • It is sufficient to model check only small model (completeness) Process Model Small Model Functional Model PTE KPT Translate Reduce to … … PTE Successful Verification Successful Verification Successful Verification

  20. Process Template Process Template Process Template X, KC X, KC X, KC R, KC R, KC R, KC Simulation Theorem S. W. Thm Automatic Small World Verification • Process of small world verification: • Translation to process model is manual • Application of small world theorem is manual • Inspection of every state transition • Proving simulation theorem is manual • Currently automating small world verification in Murphi • Verification will return both VERIFIED and proof of S.W. theorem Functional Model Process Model Small Model … KPT Translate Reduce to PTE Successful Verification Successful Verification Successful Verification

  21. Conclusion • We employed model checking to increase assurance level of SecVisor hypervisor • Found and repaired vulnerabilities in SecVisor’s design and implementation • Verified repaired design model up to 3 PTEs • Extended verification result to large model • Using small world theorem and simulation • Currently automating application of small world theorem

  22. How is verification for security different? • Limitations of related work in verification: • No adversary • Focus on checking correctness of security critical code rather than security (i.e., correctness in presence of adversary) • Correct system components do not imply secure system New State Adversary Action Kernel Exit State 1 State 2 mode = K; IP = KC; mode = U; IP = UM; Kernel Entry

  23. References • [SecVisor] Seshadri et al. “SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity”, SOSP ’07. • [TCG] http://www.trustedcomputing.com

More Related