Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems
نویسندگان
چکیده
Stuxnet worm opened a new era in cybersecurity. This heavily networking virus implemented a new threat: it infects industrial control systems; consequences of the infection might be as gravy as a technogenic catastrophe. Stuxnet performs networking to communicate between instances, contact so called “Stuxnet command and control center”, and upload malicious code to real-time controllers. The virus uses OS exploits to infect a computer and installs its component in OS kernel, gaining full control over infected node. This paper presents Sevigator – a toolkit for network confinement when only trusted application gain access to local network while other application and even OS kernel have no networking at all. Thus Sevigator effectively prevents Stuxnet scenario. Sevigator is based on hardware virtualization support: a custom hypervisor hides network interface card from the OS kernel and delegates network-based system calls of trusted applications to a dedicated service virtual machine. To prevent code injection or data alteration by a malicious kernel code or driver the hypervisor maintains integrity of the trusted applications binaries, shared objects and in-memory data.
منابع مشابه
Information Flow Containment: A Practical Basis for Malware Defense
Security threats have escalated rapidly in the past decade. “Zero-day attacks,” delivered via web pages, pictures or documents, have become significant threats. Malware is rampant, being installed using phishing, software vulnerability exploits, and software downloads. With the emergence of a lucrative black market in cyber crime, even ordinary users are becoming targets of sophisticated malwar...
متن کاملUser-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These techniques often rely on the fact that when a system is attacked from a remote location over a network, damage can ultimately be inflicted only via system calls made by processes running on the target system. This factor ...
متن کاملSecure Execution of Mutually Mistrusting Software
Commodity operating systems, e.g. Linux and Android, running on PC or smartphone, are ubiquitous in home, commercial, government, and military settings. The booming popularity of PC and smartphone makes the commodity operating system an attractive target for attacks. These systems are tasked with a variety of applications, e.g. from secure software provided by trusted enterprises to regular app...
متن کاملHarmful devices considered harmless
Attacks on host computers by malicious peripherals are a growing problem; the inexorable advance of powerful, small, cheap peripherals, which attach to plug-and-play buses, has made such attacks easy to mount. At the same time, commodity operating systems lack systematic defenses. We present Cinch, a pragmatic response to this threat. Cinch transforms USB peripherals to untrusted network endpoi...
متن کاملAirBag: Boosting Smartphone Resistance to Malware Infection
Recent years have experienced explosive growth of smartphone sales. Inevitably, the rise in the popularity of smartphones also makes them an attractive target for attacks. In light of these threats, current mobile platform providers have developed various server-side vetting processes to block malicious applications (“apps”). While helpful, they are still far from ideal in achieving their goals...
متن کامل