Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems

نویسندگان

  • Denis Efremov
  • Nikolay V. Pakulin
چکیده

Stuxnet worm opened a new era in cybersecurity. This heavily networking virus implemented a new threat: it infects industrial control systems; consequences of the infection might be as gravy as a technogenic catastrophe. Stuxnet performs networking to communicate between instances, contact so called “Stuxnet command and control center”, and upload malicious code to real-time controllers. The virus uses OS exploits to infect a computer and installs its component in OS kernel, gaining full control over infected node. This paper presents Sevigator – a toolkit for network confinement when only trusted application gain access to local network while other application and even OS kernel have no networking at all. Thus Sevigator effectively prevents Stuxnet scenario. Sevigator is based on hardware virtualization support: a custom hypervisor hides network interface card from the OS kernel and delegates network-based system calls of trusted applications to a dedicated service virtual machine. To prevent code injection or data alteration by a malicious kernel code or driver the hypervisor maintains integrity of the trusted applications binaries, shared objects and in-memory data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Flow Containment: A Practical Basis for Malware Defense

Security threats have escalated rapidly in the past decade. “Zero-day attacks,” delivered via web pages, pictures or documents, have become significant threats. Malware is rampant, being installed using phishing, software vulnerability exploits, and software downloads. With the emergence of a lucrative black market in cyber crime, even ordinary users are becoming targets of sophisticated malwar...

متن کامل

User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement

Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These techniques often rely on the fact that when a system is attacked from a remote location over a network, damage can ultimately be inflicted only via system calls made by processes running on the target system. This factor ...

متن کامل

Secure Execution of Mutually Mistrusting Software

Commodity operating systems, e.g. Linux and Android, running on PC or smartphone, are ubiquitous in home, commercial, government, and military settings. The booming popularity of PC and smartphone makes the commodity operating system an attractive target for attacks. These systems are tasked with a variety of applications, e.g. from secure software provided by trusted enterprises to regular app...

متن کامل

Harmful devices considered harmless

Attacks on host computers by malicious peripherals are a growing problem; the inexorable advance of powerful, small, cheap peripherals, which attach to plug-and-play buses, has made such attacks easy to mount. At the same time, commodity operating systems lack systematic defenses. We present Cinch, a pragmatic response to this threat. Cinch transforms USB peripherals to untrusted network endpoi...

متن کامل

AirBag: Boosting Smartphone Resistance to Malware Infection

Recent years have experienced explosive growth of smartphone sales. Inevitably, the rise in the popularity of smartphones also makes them an attractive target for attacks. In light of these threats, current mobile platform providers have developed various server-side vetting processes to block malicious applications (“apps”). While helpful, they are still far from ideal in achieving their goals...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012