Title: Email: cychen07@nuk.edu.tw
1 ?????-??
??????
??? ?401 Email cychen07_at_nuk.edu.tw
??100/8/30
2 ?????-??
??
1.??? 2.?????-???? 3.?????-?? 4.???????? 5.???????
? 6.???????? 7.??
??100/8/30
31.???
The Importance of Virtualization System Security
????(Cloud Computing)
????????
????????(Server Virtualization)
??????????????????????????1??????????????????????,
???????????????????(live migration)???
??????
41.???
??????
??????
51.???
The Importance of Virtualization System Security
?????????????
?????20
? Q4 2009, 18.2????????1
???????????????
1??IDC
61.???
?????????(1999-2009)
72.?????-????
?????
?????
?????
(2)
(1)
(5)
?????
(3)
(4)
(6)
82.?????-????
??????????????? ???????????????
(1)?????
Management console
??????????? ?????????????
(2)?????
Management server
??????? ????? (like Xen)?????????
(hypervisor)??? ????????????????????
(3)??????
Administrative VM
92.?????-????
(4)??????
??????????
Hypervisor
???????? ??????????????????????
(5)??????
Guest VM
?????? ????? ????????????????????????
?????????????
(6)?????? ????
Hypervisor escape
102.?????-????
????
113.?????-??
????????????????? ????????????????? ???????????
??????????????????
(1)?????
Management server attacks
??halting the system??????(denial of service)
??crashing????????????(denial of
service) ?????????????? ?? buffer overflows
?????????? ?????????????????? ????(authenticatio
n)??
(2)????????
Administrative VM attacks
123.?????-??
???????? ???????????????????
(3)????????
VM jumping/guest hopping
Hypervisor attacks
?????????????????? ?????????? ????????? ??????
???????????
(4)????????
Guest VM attacks
?????? ????????? ??????? ????????? ???????????
133.?????-??
If migration protocol is unencrypted,
susceptible to man-in-the-middle attack Allows
arbitrary state in VM to be modified In default
configuration, XenMotion is susceptible (no
encryption) VMwares VMotion system supports
encryption
(5)??????????
unencrypted
Host VM A
Host VM B
man-in-the-middle
Host A ?? VM ?Host B
143.?????-??
?????? VM migration is transfer of guest OS from
one physical server to another Implemented by
several virtualization products Provides high
availability and dynamic load balancing
??
VM
VM
VM
VM
VM
VM
VMware EXS
VMware EXS
153.?????-??
(6)???? Hyperjacking
Hyperjacking rootkit??,?????????????,??????????? ?
??????? ??????????????paged-out kernel code
?pagefiles (1) ???kernel code ???memory
(2) ??page file??????????,?Shellcode???dispatch
function (3) ??????????? (4)
??,??Shellcode,?????????? (5)
??????????? ?????? ?? BluePill, SubVirt, Vitriol
16???? Hyperjacking- Blue Pill??
Blue Pill
??
???IT????COSEINC????????Joanna Rutkowska?2006????
??
??AMD?SVM/Pacifica????????????????????(hypervisor)
,??????????????????????????Windows
Vista???????????????????????x64-based???anti-
rootkit ?????(???64????Vista?????????,????????????
?????)
????http//www.isecutech.com.tw/news/view.asp?nid
2705/
17???? Hyperjacking- Blue Pill??
Blue Pill
Rutkowska??????????,Blue Pill????????????,????????
?????????????,??Pacifica???????,??Blue
Pill??????????????????,????????????????????,Blue
Pill????????????Blue Pill????????????????????????
Blue Pill???Windows Vista????????,???????????Linux
?BSD??????x64????????
????http//www.isecutech.com.tw/news/view.asp?nid
2705/
18???? Hyperjacking- SubVirt??
SubVirt
??
Microsoft Research ? University of Michigan
????2006????
??
????????????????(????????????)????????(?????)????,
???????????????????????
???????????????Rootkit, http//knowledge.twisc.n
tust.edu.tw/
19???? Hyperjacking- subvirt??
Intel x86? CPU ?????,???? Ring 0 (????) ??IO
devices?CPU? Memory???????? Ring 1 Ring 2 Ring 3
?????????????????(system call)????????
???????????????Rootkit, http//knowledge.twisc.n
tust.edu.tw/
20???? Hyperjacking- subvirt??
????????????????????,?????????????? Ring
0??,????????????????????????????,??????????(Virtua
l Machine Monitor), ????VMM VMM???????????????Rin
g???VMM?????,????full virtualization,?????paravirt
ualization,????????full virtualization????????,???
??????????,?paravirtualization??????,?????????????
????????
???????????????Rootkit, http//knowledge.twisc.n
tust.edu.tw/
21???? Hyperjacking- subvirt??
?2005?2006?,Intel ? AMD ????????????? VT-x ?
AMD-V?? Intel VT-x ??,?? CPU?????????,??????????(r
oot operation),??????VMM?????,????????????????????
??????(not root operation)??????,????????Ring
0???,???????????Ring 3,??????????????????????????,
???????????????Rootkit, http//knowledge.twisc.n
tust.edu.tw/
22???? Hyperjacking- subvirt??
Subvirt
Subvirt??????,??????????????????,????????????????V
MM,????????????VMM?,?????????????VMM??????????,???
??????????????????????????,?Subvirt???????,???????
?(a)??,?????????????,??????????????????????????,VM
M???,???????????????VMM?????????,?Subvirt?????????
???VMM?????????????,??(b)???
???????????????Rootkit, http//knowledge.twisc.n
tust.edu.tw/
23???? Hyperjacking- subvirt??
Subvirt
???????????????Rootkit, http//knowledge.twisc.n
tust.edu.tw/
24???? Hyperjacking- subvirt??
Subvirt
?????????Subvirt????????? 1.Subvirt???????????,?
??????????????? 2. ?Subvirt??????,????????????????
??????Subivrt?????? 3.????????,Subvirt?????????VMM
,???????????????????VMM? 4.Subvirt?????????????,??
???????????
???????????????Rootkit, http//knowledge.twisc.n
tust.edu.tw/
25???? Hyperjacking- Vitriol??
Vitriol
??
Dino Dai Zovi??
??
- ??Intel???VT-x????????,???????AMD????????(SVM)/Pac
ifica?????????
26 4.????????
(1)???????????? ??5??259 ??? (X-Force
DataBase) (2)?????????????? (3)???????
(hypervisor) ??????? (4)????????? (5)?????????????
????,???????? (6)????????????, ????????? (7)??????
?????,????????
27??????
?????????????????????? ?????????????????????????
?????SSL???????
????
??????????????? ??????????????
???????????????? ??BotNet???????
??,??????????????????????????????????
?????
?????? ?????
?????? ?(Inter-VM)
??????
??????
28????????
29 5.????????
???????????? IBM Security Virtual Server
Protection for VMWare ?????????????????????????
??IPS protection (?? IPS ???????????) Future
may see virtualization-based sandboxing ??(Sandbo
x)?????????(locked-down OS) ??????????????? ??,
?????? ??(Sandbox)???????????,??????????????
??(Sandboxing)???????????????????,???????????????
???????????,?????????????????Leopard ????????
(???? Bonjour ???? Spotlight ????) ???
sandbox????,????????
30 6.????????
??????? ?????????????????? ?????????????????????
????????? ????????????? ???????????????? ??logg
ing
31 6.????????
???????? ????????? ????????????? ??????????????
????log?? ?? log ????? filling
partitions ?????????????????? ??????????????? ?
???root login
326.????????
???????? ????? ????? OS ??????? ????????
???????????? ???????? ???????? ??????(
access control) ?????? ?????? auditing of file
operations (access, creation, deletion,
) ?????????? virtual devices VMware
?????????VM ??
33 6.????????
?????? ??????????? hypervisor ??????????????????
???????? ???????,??????? ??VM traffic
?????(Virtual Switch)??VLAN port groups in
????VM????? virtual adapter ?????????? port
group ?port groups??????????(virtual adapters)
???????
34 7.??
(1) ???????????????? (2) ???????????????
35????
???? Virtualization System Security Bryan
Williams, IBM X-Force Advanced Research Tom
Cross, Manager, IBM X-Force Security Strategy