The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture

被引:4
|
作者
Buhren, Robert [1 ]
Vetter, Julian [1 ]
Nordholz, Jan [1 ]
机构
[1] Tech Univ Berlin, Berlin, Germany
关键词
Rootkit; Hypervisor; ARM; Virtualization;
D O I
10.1007/978-3-319-50011-9_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The virtualization capabilities of today's systems offer rootkits excellent hideouts, where they are fairly immune to countermeasures. In this paper, we evaluate the vulnerability to hypervisor-based rootkits of ARM-based platforms, considering both ARMv7 and ARMv8. We implement a proof-of-concept rootkit to prove the validity of our findings. We then detail the anatomy of an attack wherein a hypervisor rootkit and a userspace process collaborate to undermine the isolation properties enforced by the Linux kernel. Based on our discoveries, we explore the possibilities of mitigating each attack vector. Finally, we discuss methods to detect such highly privileged rootkits so as to conceive more effective countermeasures.
引用
收藏
页码:376 / 391
页数:16
相关论文
共 50 条
  • [31] Reconciling Security with Virtualization: A Dual-Hypervisor Design for ARM TrustZone
    Cicero, Giorgiomaria
    Biondi, Alessandro
    Buttazzo, Giorgio
    Patel, Anup
    2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2018, : 1628 - 1633
  • [32] A tiny hypervisor-based trusted geolocation framework with minimized TPM operations
    Park, Sungjin
    Won, Jong-Jin
    Yoon, Jaenam
    Kim, Kyong Hoon
    Han, Taisook
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 122 : 202 - 214
  • [33] SHADuDT: Secure hypervisor-based anomaly detection using danger theory
    Azmi, Reza
    Pishgoo, Boshra
    COMPUTERS & SECURITY, 2013, 39 : 268 - 288
  • [34] Lightweight and Efficient Hypervisor-Based Dynamic Binary Instrumentation and Analysis Method
    Pan, Jiaye
    Yi, Zhuang
    Xue-Jian, Zhao
    Sun, Binglin
    IEEE ACCESS, 2020, 8 : 164593 - 164610
  • [35] Formal virtualization requirements for the ARM architecture
    Penneman, Niels
    Kudinskas, Danielius
    Rawsthorne, Alasdair
    De Sutter, Bjorn
    De Bosschere, Koen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2013, 59 (03) : 144 - 154
  • [36] Design of Hypervisor-based Integrated Intrusion Detection System in Cloud Computing Environment
    Wang, Chih-Hung
    Chen, Xuan-Liang
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 972 - 981
  • [37] Block-Level Storage Caching for Hypervisor-Based Cloud Nodes
    Tak, Byungchul
    Tang, Chunqiang
    Chang, Rong N.
    Seo, Euiseong
    IEEE ACCESS, 2021, 9 : 88724 - 88736
  • [38] DLP-Visor: A Hypervisor-based Data Leakage Prevention System
    Amit, Guy
    Yeshooroon, Amir
    Kiperberg, Michael
    Zaidenberg, Nezer J.
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 416 - 423
  • [39] Dynamic Malware Analysis Using IntroVirt: a Modified Hypervisor-Based System
    White, Joshua S.
    Pape, Stephen R.
    Meily, Adam T.
    Gloo, Richard M.
    CYBER SENSING 2013, 2013, 8757
  • [40] Hypervisor-Based Multicore Feedback Control of Mixed-Criticality Systems
    Crespo, Alfons
    Balbastre, Patricia
    Simo, Jose
    Coronel, Javier
    Gracia Perez, Daniel
    Bonnot, Philippe
    IEEE ACCESS, 2018, 6 : 50627 - 50640