An analysis of hardware-assisted virtual machine based rootkits
Authors
Fannon, Robert C.
Advisors
Dinolt, George
Second Readers
Eagle, Chris
Subjects
virtual machine
hypervisor
virtual machine monitor
hardware-assisted virtual machine
virtual machine based rootkit
rootkit
AMD-V
Intel VT-x
virtual machine control block
virtual machine control structure
operating system
Blue Pill
Vitriol
user mode
kernel mode
VM
VMM
VMBR
HVM
VMCB
VMCS
hypervisor
virtual machine monitor
hardware-assisted virtual machine
virtual machine based rootkit
rootkit
AMD-V
Intel VT-x
virtual machine control block
virtual machine control structure
operating system
Blue Pill
Vitriol
user mode
kernel mode
VM
VMM
VMBR
HVM
VMCB
VMCS
Date of Issue
2014-06
Date
Jun-14
Publisher
Monterey, California: Naval Postgraduate School
Language
Abstract
The use of virtual machine (VM) technology has expanded rapidly since AMD and Intel implemented hardware-assisted virtualization in their respective x86 architectures. These new capabilities have resulted in a corresponding expansion of security challenges. Hardware-Assisted VM (HVM) rootkits have become a credible threat because of these new virtualization technologies and have provided an added vector with which root access can be exploited by malicious actors. An HVM rootkit covertly subverts an Operating System (OS) running on a general purpose x86 based processor and migrates that OS into a VM under the control of a malicious hypervisor. This results in the hypervisor possessing an effective privilege level of ring -0, a higher privilege level than ring 0, which the target OS possesses in either its non-virtualized or virtualized state. The only known successful HVM rootkits are Blue Pill and Vitriol. This thesis analyzes and compares the source code for both AMD-V and Intel VT-x implementations of Blue Pill to identify commonalities in the respective versions' attack methodologies from both a functional and technical perspective. Findings conclude that their functional implementations are nearly identical; but their technical implementations are very different, primarily because of differences in the AMD-V and Intel VT-x specifications.
Type
Thesis
Description
Series/Report No
Department
Computer Science
Organization
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
