ferify: A Virtual Machine File Protection System against Zero-Day Attacks

04/19/2020
by   Alexis Peppas, et al.
0

Most existing solutions for protecting VMs assume known attack patterns or signatures and focus on detecting malicious manipulations of system files and kernel level memory structures. In this research we develop a system called ferify, which leverages VM introspection (VMI) to protect user files hosted on a VM against unauthorized access even after an attacker has managed to obtain root privileges on the VM. ferify maintains in the hypervisor domain a shadow file access control list (SACL) that is totally transparent to the VM. It uses the SACL to perform independent access control on all system calls that may operate on the target files. Further, ferify prevents kernel modification, ensures the integrity of process ownership, and supports hypervisor based user authentication. We have developed a ferify prototype for Linux and through a set of controlled experiments we show that the system is able to mitigate a range of zero-day attacks that otherwise may evade signature-based solutions. In addition, we analyze the root cause of the observed high processing overhead from trapping of system calls, and propose a general solution that can potentially cut that overhead by half.

READ FULL TEXT
research
01/07/2023

SFP: Providing System Call Flow Protection against Software and Fault Attacks

With the improvements in computing technologies, edge devices in the Int...
research
09/17/2019

Breaking Imphash

There are numerous schemes to generically signature artifacts. We specif...
research
02/25/2021

BPF for storage: an exokernel-inspired approach

The overhead of the kernel storage path accounts for half of the access ...
research
04/10/2019

KEY-SSD: Access-Control Drive to Protect Files from Ransomware Attacks

Traditional techniques to prevent damage from ransomware attacks are to ...
research
04/05/2018

A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT

Cloud-assisted Cognitive Internet of Things has powerful data analytics ...
research
08/01/2023

Verifiable Data Sharing Scheme for Dynamic Multi-Owner Setting

One of scenarios in data-sharing applications is that files are managed ...
research
12/15/2017

Mining Sandboxes for Linux Containers

A container is a group of processes isolated from other groups via disti...

Please sign up or login with your details

Forgot password? Click here to reset