SlideShare ist ein Scribd-Unternehmen logo
1 von 21
®




µ-Xen
Ian Pratt
SVP, Products
Bromium Inc.
                    1
Outline                                        ®




•   µ-Xen Goals
•   Architecture and implementation
•   Evolutionary path
•   Use case: Bromium end-point security


                                           2
The µ-Xen Client Hypervisor                              ®




• Derived from the Xen code base
• Designed to address client hypervisor deployment
  challenges
• Designed to achieve a high-degree of security
  assurance
• No requirement to support legacy s/w or h/w
• Optimized to support micro-virtualization
• Evolution to a new class of hypervisor
                                                     3
Evolution to a new class of hypervisor                  ®




• Start with a self-contained type-2
  – Host kernel module containing µ-Xen blob
  – Well-defined interface to/from the host
     • Memory allocation, Schedule VCPUs, Timers,
       Events
• Similar to hXen project
  – Windows, OS X; easily portable
  – µ-Xen drives VT hardware, leaves IO and other
    hardware to host OS                             4
µ-Xen streamlines Xen code base                        ®




• x64 only
• No support for systems that are not VTx/EPT or
  AMDV/NPT capable
• No support for PV MMU guests
• Significant code size reductions
• No compat code
• Separate build target
• Future: slim down instruction emulator
                                                   5
µ-Xen virtual IO                                                      ®




• µ-Xen demultiplexes IORecs and events to
  multiple host processes per VM
  – Able to have separate video, audio, disk, net etc processes
  – Helps scheduling latency, enables better exploitation
    mitigation lock-down
• Use just the relevant parts of QEMU
• User-space PV backend drivers
• Post-boot virtual IO device revocation

                                                                  6
Support for large numbers of similar VMs              ®




• Support for VM fork
  – Simple extension of Populate on Demand code
• Tree of templates/VMs supported
• PV driver support for re-sharing free pages
• IO tracking to re-share swapped and re-read
  pages

                                                  7
Evolution to a new class of hypervisor                        ®




• Goal: host is responsible for resource
  allocation, but can not interfere with the
  privacy or integrity of the hypervisor or other
  guests, e.g.:
  – Hypervisor asks host for memory, receives it, then
    removes host access to it
  – Host may perform IO on behalf of hypervisor and
    guests, but must be privacy and integrity protected
  – Host may deny service, crash; IO tamper detectable
                                                          8
De-privilege host into a VT container                                     ®




• Remove host access to hypervisor and guest memory in
  EPT tables
   – h/w devices passed through to host, VTd protected
• Device models can only access Granted memory
   – Require PV network and disk as no virtual DMA
   – Guest IO buffers encrypted/authenticated before grant copy/map
• Save/restore, dom builder must first have guest memory
  encrypted/authenticated by hypervisor
   – Hypervisor paging requires similar treatment

                                                                      9
Further Enhanced Security                                 ®




• Migrate certain host h/w devices to
  ownership by hypervisor or privileged
  guest(s), replace with virtual device
  – E.g. Keyboard controller to avoid key logging
  – Possibly WiFi/NIC too
• Measured launch of hypervisor
  – TXT/TPM to establish DRoT
  – Remote attestation of hypervisor configuration
                                                     10
Task-based Micro-virtualization
The Challenge
What Went Wrong?

 Poor Isolation leads to Vulnerability
   Multi-tenancy of code (& data) from a huge set of trust sources
   Code & Data are executed in the context of a few, weakly organized and
    poorly isolated “bins” representing levels of trust - e.g. UID, GID, PID
   Overloaded, complex specs & buggy implementations of porous
    interfaces
 Thus malware can:
   Access data and documents in the same “bin”
   Subvert other good code that is placed into the same “bin”
   Use another bug in an App or OS to elevate its privilege
Why Legacy Security Solutions Fail

Black-listing: Detection is not protection
   Doesn’t protect users from zero day attacks
   Unable to detect targeted & advanced malware

White-listing: Restriction is not protection
 Users want to be productive
 Attackers can compromise trusted applications and web sites
The Challenge




Bromium Confidential        15
Bromium Confidential
The Micro-Virtualization Approach


Next generation endpoint security
A   pragmatic approach to trusted computing

Based on hardware based isolation and not detection
 Contain risky activity from corporate data and network
 Block zero day and polymorphic threats


Provides isolation & trust through hardware virtualization
Lightweight, fast,
  Virtualizes vulnerable
                                        hidden, with an
   tasks within a single
                                        unchanged native UX
      Windows desktop

   Small code base for     Hypervisor   I/O Virtualization (VT-d)
    maximum security
                                        TXT & TPM based
                                        hardware root of
Hardware Virtualization                 trust
                 (VT-x)
The Microvisor isolates
                        vulnerable tasks from
                       Windows, each other &
                        key system resources
    Windows and IT
 Micro-VMs have
    provisioned apps
  “least privilege”
       are trusted
   access to files,                              Each vulnerable task
networks & devices,                               is instantly isolated
 and execute CoW                                     in a micro-VM,
                                                 invisible to the user
Key Threat Vectors Are Isolated


Web Browsing                      E-mail Attachments
External Documents                USB files
Conclusions                                       ®




• µ-Xen is targeted at client systems
• Combines ease of deployment with useful
  security properties
• Enables task-based micro-virtualization,
  allowing mandatory access control to be
  retrofitted to commodity client OSes
• We’re hiring!   Please email ian@bromium.com
                                             21

Weitere ähnliche Inhalte

Was ist angesagt?

Sensory Adaptation to Strabismus
Sensory Adaptation to StrabismusSensory Adaptation to Strabismus
Sensory Adaptation to Strabismus
Hossein Mirzaie
 

Was ist angesagt? (20)

Pediatric refraction
Pediatric       refractionPediatric       refraction
Pediatric refraction
 
Gonioscopy
GonioscopyGonioscopy
Gonioscopy
 
Evaluation of ptosis
Evaluation of ptosis Evaluation of ptosis
Evaluation of ptosis
 
Visual field report
Visual field report Visual field report
Visual field report
 
fundus fluorescein angiography V/S indocyanine green angiography
fundus fluorescein angiography V/S indocyanine green angiographyfundus fluorescein angiography V/S indocyanine green angiography
fundus fluorescein angiography V/S indocyanine green angiography
 
Idiopathic polypoidal choroidal vasculopathy
Idiopathic polypoidal choroidal vasculopathyIdiopathic polypoidal choroidal vasculopathy
Idiopathic polypoidal choroidal vasculopathy
 
SIXTH CRANIAL NERVE PALSY- Diagnosis and management
SIXTH CRANIAL NERVE PALSY- Diagnosis and managementSIXTH CRANIAL NERVE PALSY- Diagnosis and management
SIXTH CRANIAL NERVE PALSY- Diagnosis and management
 
Pathologies in ffa
Pathologies in ffaPathologies in ffa
Pathologies in ffa
 
Sensory Adaptation to Strabismus
Sensory Adaptation to StrabismusSensory Adaptation to Strabismus
Sensory Adaptation to Strabismus
 
Presbyopia by Juned ppt.
 Presbyopia by Juned ppt.  Presbyopia by Juned ppt.
Presbyopia by Juned ppt.
 
Laser therapy in glaucoma
Laser therapy in glaucomaLaser therapy in glaucoma
Laser therapy in glaucoma
 
Drusen
DrusenDrusen
Drusen
 
Extraocular muscle actions & motility
Extraocular muscle actions & motilityExtraocular muscle actions & motility
Extraocular muscle actions & motility
 
FFA and ICG
FFA and ICGFFA and ICG
FFA and ICG
 
direct ophthalmoscope
direct ophthalmoscopedirect ophthalmoscope
direct ophthalmoscope
 
Glaucoma laser therapy
Glaucoma laser therapyGlaucoma laser therapy
Glaucoma laser therapy
 
Gonioscopy
GonioscopyGonioscopy
Gonioscopy
 
Techniques of retinoscopy
Techniques of retinoscopyTechniques of retinoscopy
Techniques of retinoscopy
 
Duochrome.pptx
Duochrome.pptxDuochrome.pptx
Duochrome.pptx
 
Polarized lenses
Polarized lensesPolarized lenses
Polarized lenses
 

Andere mochten auch

Red Hat Enterprise Linux 5.2 Virtualization Guide
Red Hat Enterprise Linux 5.2 Virtualization GuideRed Hat Enterprise Linux 5.2 Virtualization Guide
Red Hat Enterprise Linux 5.2 Virtualization Guide
Rishi Sharma
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622
Todd Deshane
 
Mirage: extreme specialisation of virtual appliances
Mirage: extreme specialisation of virtual appliancesMirage: extreme specialisation of virtual appliances
Mirage: extreme specialisation of virtual appliances
The Linux Foundation
 
Oscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCP
Oscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCPOscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCP
Oscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCP
The Linux Foundation
 
Windsor: Domain 0 Disaggregation for XenServer and XCP
	Windsor: Domain 0 Disaggregation for XenServer and XCP	Windsor: Domain 0 Disaggregation for XenServer and XCP
Windsor: Domain 0 Disaggregation for XenServer and XCP
The Linux Foundation
 

Andere mochten auch (20)

Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XT
 
[HackInTheBox] Breaking virtualization by any means
[HackInTheBox] Breaking virtualization by any means[HackInTheBox] Breaking virtualization by any means
[HackInTheBox] Breaking virtualization by any means
 
Xen @ Google, 2011
Xen @ Google, 2011Xen @ Google, 2011
Xen @ Google, 2011
 
Red Hat Enterprise Linux 5.2 Virtualization Guide
Red Hat Enterprise Linux 5.2 Virtualization GuideRed Hat Enterprise Linux 5.2 Virtualization Guide
Red Hat Enterprise Linux 5.2 Virtualization Guide
 
Xen revisited
Xen revisitedXen revisited
Xen revisited
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622
 
Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)
 
Why xen slides
Why xen slidesWhy xen slides
Why xen slides
 
Xen io
Xen ioXen io
Xen io
 
Mirage: extreme specialisation of virtual appliances
Mirage: extreme specialisation of virtual appliancesMirage: extreme specialisation of virtual appliances
Mirage: extreme specialisation of virtual appliances
 
Xen PV Performance Status and Optimization Opportunities
Xen PV Performance Status and Optimization OpportunitiesXen PV Performance Status and Optimization Opportunities
Xen PV Performance Status and Optimization Opportunities
 
Openstack Xen and XCP
Openstack Xen and XCPOpenstack Xen and XCP
Openstack Xen and XCP
 
Xen Overview Q3 2009
Xen Overview Q3 2009Xen Overview Q3 2009
Xen Overview Q3 2009
 
Art of Using Xen at Scale
Art of Using Xen at ScaleArt of Using Xen at Scale
Art of Using Xen at Scale
 
Xen Hypervisor
Xen HypervisorXen Hypervisor
Xen Hypervisor
 
Engaging the xen community
Engaging the xen communityEngaging the xen community
Engaging the xen community
 
Oscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCP
Oscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCPOscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCP
Oscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCP
 
Windsor: Domain 0 Disaggregation for XenServer and XCP
	Windsor: Domain 0 Disaggregation for XenServer and XCP	Windsor: Domain 0 Disaggregation for XenServer and XCP
Windsor: Domain 0 Disaggregation for XenServer and XCP
 
Xen and Apache cloudstack
Xen and Apache cloudstack  Xen and Apache cloudstack
Xen and Apache cloudstack
 
Scale11x : Virtualization with Xen and XCP
Scale11x : Virtualization with Xen and XCP Scale11x : Virtualization with Xen and XCP
Scale11x : Virtualization with Xen and XCP
 

Ähnlich wie µ-Xen

Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
The Linux Foundation
 
Xen Project Update LinuxCon Brazil
Xen Project Update LinuxCon BrazilXen Project Update LinuxCon Brazil
Xen Project Update LinuxCon Brazil
The Linux Foundation
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
karanamsaibabu
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
vivekbhat
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
vivekbhat
 

Ähnlich wie µ-Xen (20)

Xen Community Update 2011
Xen Community Update 2011Xen Community Update 2011
Xen Community Update 2011
 
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
 
virtualization(1).pptx
virtualization(1).pptxvirtualization(1).pptx
virtualization(1).pptx
 
virtualization.pptx
virtualization.pptxvirtualization.pptx
virtualization.pptx
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overview
 
Xen Project Update LinuxCon Brazil
Xen Project Update LinuxCon BrazilXen Project Update LinuxCon Brazil
Xen Project Update LinuxCon Brazil
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
 
Virtualization
VirtualizationVirtualization
Virtualization
 
unit-2.pptx
unit-2.pptxunit-2.pptx
unit-2.pptx
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the Cloud
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008
 

Mehr von The Linux Foundation

Mehr von The Linux Foundation (20)

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made Simple
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

µ-Xen

  • 2. Outline ® • µ-Xen Goals • Architecture and implementation • Evolutionary path • Use case: Bromium end-point security 2
  • 3. The µ-Xen Client Hypervisor ® • Derived from the Xen code base • Designed to address client hypervisor deployment challenges • Designed to achieve a high-degree of security assurance • No requirement to support legacy s/w or h/w • Optimized to support micro-virtualization • Evolution to a new class of hypervisor 3
  • 4. Evolution to a new class of hypervisor ® • Start with a self-contained type-2 – Host kernel module containing µ-Xen blob – Well-defined interface to/from the host • Memory allocation, Schedule VCPUs, Timers, Events • Similar to hXen project – Windows, OS X; easily portable – µ-Xen drives VT hardware, leaves IO and other hardware to host OS 4
  • 5. µ-Xen streamlines Xen code base ® • x64 only • No support for systems that are not VTx/EPT or AMDV/NPT capable • No support for PV MMU guests • Significant code size reductions • No compat code • Separate build target • Future: slim down instruction emulator 5
  • 6. µ-Xen virtual IO ® • µ-Xen demultiplexes IORecs and events to multiple host processes per VM – Able to have separate video, audio, disk, net etc processes – Helps scheduling latency, enables better exploitation mitigation lock-down • Use just the relevant parts of QEMU • User-space PV backend drivers • Post-boot virtual IO device revocation 6
  • 7. Support for large numbers of similar VMs ® • Support for VM fork – Simple extension of Populate on Demand code • Tree of templates/VMs supported • PV driver support for re-sharing free pages • IO tracking to re-share swapped and re-read pages 7
  • 8. Evolution to a new class of hypervisor ® • Goal: host is responsible for resource allocation, but can not interfere with the privacy or integrity of the hypervisor or other guests, e.g.: – Hypervisor asks host for memory, receives it, then removes host access to it – Host may perform IO on behalf of hypervisor and guests, but must be privacy and integrity protected – Host may deny service, crash; IO tamper detectable 8
  • 9. De-privilege host into a VT container ® • Remove host access to hypervisor and guest memory in EPT tables – h/w devices passed through to host, VTd protected • Device models can only access Granted memory – Require PV network and disk as no virtual DMA – Guest IO buffers encrypted/authenticated before grant copy/map • Save/restore, dom builder must first have guest memory encrypted/authenticated by hypervisor – Hypervisor paging requires similar treatment 9
  • 10. Further Enhanced Security ® • Migrate certain host h/w devices to ownership by hypervisor or privileged guest(s), replace with virtual device – E.g. Keyboard controller to avoid key logging – Possibly WiFi/NIC too • Measured launch of hypervisor – TXT/TPM to establish DRoT – Remote attestation of hypervisor configuration 10
  • 13. What Went Wrong?  Poor Isolation leads to Vulnerability  Multi-tenancy of code (& data) from a huge set of trust sources  Code & Data are executed in the context of a few, weakly organized and poorly isolated “bins” representing levels of trust - e.g. UID, GID, PID  Overloaded, complex specs & buggy implementations of porous interfaces  Thus malware can:  Access data and documents in the same “bin”  Subvert other good code that is placed into the same “bin”  Use another bug in an App or OS to elevate its privilege
  • 14. Why Legacy Security Solutions Fail Black-listing: Detection is not protection  Doesn’t protect users from zero day attacks  Unable to detect targeted & advanced malware White-listing: Restriction is not protection  Users want to be productive  Attackers can compromise trusted applications and web sites
  • 15. The Challenge Bromium Confidential 15 Bromium Confidential
  • 16. The Micro-Virtualization Approach Next generation endpoint security A pragmatic approach to trusted computing Based on hardware based isolation and not detection  Contain risky activity from corporate data and network  Block zero day and polymorphic threats Provides isolation & trust through hardware virtualization
  • 17. Lightweight, fast, Virtualizes vulnerable hidden, with an tasks within a single unchanged native UX Windows desktop Small code base for Hypervisor I/O Virtualization (VT-d) maximum security TXT & TPM based hardware root of Hardware Virtualization trust (VT-x)
  • 18. The Microvisor isolates vulnerable tasks from Windows, each other & key system resources Windows and IT Micro-VMs have provisioned apps “least privilege” are trusted access to files, Each vulnerable task networks & devices, is instantly isolated and execute CoW in a micro-VM, invisible to the user
  • 19.
  • 20. Key Threat Vectors Are Isolated Web Browsing E-mail Attachments External Documents USB files
  • 21. Conclusions ® • µ-Xen is targeted at client systems • Combines ease of deployment with useful security properties • Enables task-based micro-virtualization, allowing mandatory access control to be retrofitted to commodity client OSes • We’re hiring! Please email ian@bromium.com 21

Hinweis der Redaktion

  1. dynamic content cannot be blacklistedmalicious content can compromise whitelisted apps