The R-Wall System(Concept of Multiple kernel scanning in detecting

Transcription

The R-Wall System(Concept of Multiple kernel scanning in detecting
The R-Wall System
Concept of Multiple Kernel Scanning in detecting Malwares
Divyajyoti Das, KIIT University
Somesh Nanda, C.V.R.C.E
Plaban Mohanty,C.E.T
“IT Security for the Next Generation”
Asia Pacific & MEA Cup, Hong Kong
14-16 March, 2012
.
PAGE 2 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup | 14-16 March 2012
MOTIVATION
MOTIVATION
.
Recycler.exe
Windows 7
Ubuntu 10.10
 System Behaves Abnormally.
 Crashed
 All Drives Cleaned
PAGE 4 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
 System is Normal.
| 14-16 March 2012
OBSERVATION
.
PAGE 5 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March 2012
RELATED WORK
1.
2.
3.
4.
5.
MECHANISM OF FILE EXECUTION
MALWARE ATTACKING POINTS
EXPERIMENTS
OBSERVATIONS
GRAPHICAL MODEL
MECHANISM OF FILE EXECUTION
(What happens when we read a file?)
Readfile()
(Win32 API)
Application
User Mode
NtReadfile()
(Kernel32.dll)
•
Application started
Int 2E
(Ntdll.dll)
•
Readfile() called on File1.txt
KiSystemService
(Ntoskrnl.exe)
•
NtReadFile() processed
•
I/O Subsystem called
•
IRP generated
•
Data at File1.txt requested
from ntfs.sys
•
Data on D: requested from
dmio.sys
•
Data on disk 2 requested
from disk.sys
Kernel Mode
Call NtReadFile()
(Ntoskrnl.exe)
Initiate I/O Operation
(driver.sys)
File System Driver
(ntfs.sys, …)
Volume manager disk driver
(ftdisk.sys, dmio.sys)
I/O Manager
Disk Driver (disk.sys)
Disk port driver
Disk miniport driver
1
2
3
Disk Array
PAGE 7 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
MALWARE ATTACKING POINTS
(Points where a Malware can attack a file during its Execution)
Readfile()
(Win32 API)
Application
NtReadfile()
(Kernel32.dll)
Int 2E
(Ntdll.dll)
User Mode
•
Binary replacement eg
modified Exe or Dll
•
Binary modification in memory
•
User land Hooking
•
Kernel Hooking
•
Driver Replacement
•
Direct Kernel Object
Manipulation
•
IO Request Packet Hooking
•
Filter Drivers- File System
Filter, Volume Filter, Bus Filter ,
Disk Filter
Kernel Mode
KiSystemService
(Ntoskrnl.exe)
Call NtReadFile()
(Ntoskrnl.exe)
Initiate I/O Operation
(driver.sys)
File System Driver
(ntfs.sys, …)
Volume manager disk driver
(ftdisk.sys, dmio.sys)
I/O Manager
Disk Driver (disk.sys)
Disk port driver
Disk miniport driver
1
2
3
Disk Array
PAGE 8 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
EXPERIMENT
Windows
Linux
Virus Collection
PAGE 9 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
OBSERVATIONS
(Test Results showing dependence of Malwares on OS)
Windows
Linux/Unix
Others
BrO_AcT,Conflicker,CIH,Fun,Hare,Sh
oerec,Simile,Shankar’s Virus, Xpaj,
Small,Godog,Xorer,Expiro,Pioneer.
Ynit.827,Grip,Vampire,RcrGood,DerFu
nf,Corona,Kru,Fichier,Diesel.962
Cosmac,BackTrack,EasyCrack,Lamer
Exterminator
Delf,Tvido,Magic,Calypso,Agent,Folco
m,Xorer,Perrun,Trats,Dobom,Ostrich,
Wide,Nawa,Grum,Hidrag,Teta,Parite.
Xone,Arches,Hasher,Rexob,Adore,Ko
rk,Caveat,Alaeda,Nuxbee,Podlso
ByteBandit,SCA,SevenDust,Weaponx
,Nvp,Tweesh,TetraCycle
Henkey.Rotten,Porex,Rufoll.1432,HLL
O.Casbo,Sankei.4153,Redemption,Dy
balom,DigiPog,Palevo,ShakBlades
Winux,ZipWorm,Millen,Slapper,Mighty,
Vit,Droiddream,Kork,Bukowski
Code1,Code252,Syst.2402,Kuarahy.4
640
Bybz,WBNA,Randex,Cridex,Huhk,Kar
achun,Bursted,Rustock,xtail,DunDun,
Expiro,Texel,TDSS,Gyd41,Folcom
Kagob a,Kagob b,Rike,RST,42,Bliss
HLLW.Cespol,Ganes.330
Cheburgen,Texel,NvrDoc,Sculament,
Teta.8192,Velost.1186,Heised,Miam.3
657,Beliad,Aegi,Vexi,Baros,Grurev
Millen,Ramen,BadBunny,Arches
Sillyc.213
PAGE 10 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
GRAPHICAL MODEL
.
Cross Platform Malwares
Malware & Operating Systems
• Percentage of Cross Platform Malwares
very less( Less than 7%)
Windows
• Impact caused is moderate.
Linux
Windows &
Linux
Other OS
• IncognitoRAT
MSIL.Yakizake
Winux
DwnLdr
Boonana Trojan
KoobCls-A
KoobInst-A
KoobStrt-A
PAGE 11 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March 2012
CONCLUSION
.
PAGE 12 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March 2012
IMPLEMENTATION
1. CONCEPT OF MULTIPLE KERNEL SCANNING
2. R-WALL : SOFTWARE APPROACH
3. R-WALL : EMBEDDED APPROACH
CONCEPT OF MULTIPLE KERNEL SCANNING
MALWARE
PAGE 14 |
Kernel A
Kernel B
Kernel C
OBSERVATION
OBSERVATION
OBSERVATION
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
EMBEDDED APPROACH
IMAGINE
.
Wireless Router
R-Wall(Remote Wall)
Anti- Virus
PAGE 16 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March 2012
EMBEDDED ARCHITECTURE
Browser Sp. Data
Decide: Data Browser Sp. OR System Sp.
Decision Engine(1)
Modem
SCRIPT EMULATOR
Decide: Report(A)+Report(B). Allow/Block
Data + Report(A)
Decision Engine(2)
USB
TCP/IP
A
USER
Real Time Operating System(RTOS)
Scanning Engine
Database
Sandbox
Scanning Engine
Sandbox
USER
PAGE 17 |
B
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
PROCESSOR SELECTION
 ARM Cortex A Series
(Cortex A5,Cortex A7, Cortex A8,Cortex A9,Cortex A15)
•
Frequency up to 2.5 Ghz : Cortex A8- 1 Ghz, Cortex A9- 2 Ghz, Cortex A15-2.5 Ghz
•
Delivers up to 4000 DMPIS : Cortex A8- 2000 DMPIS, Cortex A15-4000 DMPIS.
•
Extensible RAM up to 512 MB.
•
Superscalar microprocessor core: 13 stage integer pipelining.
•
Memory tagged as secure and non-secure by the system.
•
Full Hardware Virtualization, Large Physical Address Extensions(Up to 1TB).
•
Support for wide variety of Operating Systems.
•
Physical memory extension larger than 4GB.
PAGE 18 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
KERNEL SELECTION
 Real-Time Operating Systems
•
RTLinux
•
QP(Quantum Platform)
•
FunkOS
•
FreeRTOS
•
ChibiOS/RT
•
BeRTOS
•
OnTime RTOS
•
NuttXRTOS
PAGE 19 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
TCP/IP STACK SELECTION
 CMX-MicroNet
•
•
•
•
•
•
•
•
TCP/IP CMX-MicroNet is an embedded TCP/IP stack specifically designed for
optimized use of Flash and RAM resources on ARM Cortex processor.
Offers true TCP/IP networking via direct, dial-up or Ethernet Connectivity & wireless
Ethernet(802.11b).
Software solution does not require additional processor
Runs stand-alone or with any RTOS
Economical one time fee
Full source code provided
Extremely small Flash/RAM requirements
Supported Protocols:-
TCP PPP
UDP
SLIP IP DHCP
FTP TFTP SMTP HTTP Web Server
PAGE 20 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
SOFTWARE APPROACH
SOFTWARE ARCHITECTURE
Signature Based Detection
Check summing
Static
Heuristic
Known plaintext cryptanalysis
Statistical Analysis
Emulation
Sandbox
A
Sandbox
B
Sandbox
C
Run-time Packers/Archiving Utilities
Database
PAGE 22 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March , 2012
Dynamic
Heuristic
SECURING R-WALL
MALWARES BELOW KERNEL
1.Locking down SMRAM(System Management Mode RAM)
register in BIOS.
R-Wall
Secure
2.Installing a Virtual Machine Monitor that prevents installation
of other VMMs.
3.Disabling ACPI(Advanced Control & Peripheral Interface) in
BIOS & auditing ACPI tables.
PAGE 24 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
Hope you are now convinced that our concept can
“Re-engineer the Anti-Virus” !
PAGE 25 |
"IT Security for the Next Generation", Asia Pacific & MEA Cup
| 14-16 March, 2012
Thank You
Divyajyoti Das, Kalinga Institute of Industrial Technology, Bhubaneswar
“IT Security for the Next Generation”
Asia Pacific & MEA Cup, Hong Kong
14-16 March, 2012

Similar documents

Die BUCHSTAVIER - Das Dosierte Leben

Die BUCHSTAVIER - Das Dosierte Leben Das Dosierte Leben Das Avant-Avantgarde-Magazin 16. Jahrgang

More information