N-Variant Execution for Improved Security Measures

1
 
Alexios Voulimeneas
, Dokyung Song, Fabian Parzefall, Yeoul Na,
Per Larsen, Michael Franz, Stijn Volckaert
Distributed Heterogeneous
N-Variant Execution
2
Solutions
 
Type-Safe Programming Languages (e.g. Rust)
3
 
Type-Safe 
Programming 
Languages (e.g. Rust)
 
Mitigations:
 
Integrity Enforcement (e.g. CFI)
Software Diversity (e.g. ASLR)
 
Integrity
 Enforcement
 (e.g. CFI)
Software Diversity (e.g. ASLR)
 
Mitigations:
 
N-Variant eXecution
 (NVX)
N-Variant eXecution (NVX)
Follower
Variant
Leader
Variant
Monitor
Kernel
 
In a nutshell:
 
Run multiple diversified program variants
in parallel
Execute these variants in lockstep on
identical inputs
Suspend them at every system call
Compare system call numbers/arguments
 
I/O replication for transparency and
identical inputs
 
 
brk
 
brk
4
 
write
 
write
What NVX Systems can do
Protect Against
Attacks that rely on knowledge of the target's absolute virtual address space
layout
Attacks that attempt to acquire that knowledge through information leakage
5
What NVX Systems cannot do
Protect Against
 
Attacks that build on knowledge of the program's internal geometry (e.g.,
kh
relative data/instruction layouts) and/or data representation
6
ProFTPD SSL Private Key Leak (DOP)
Hu et al. build an information 
disclosure attack on ProFTPD
-
Traverse 6 data structures using only data-only gadgets, ultimately reaching a private key
7
Position-independent Code Reuse (PIROP)
Göktas et al. construct code-reuse exploits that use 
relative
 locations
in memory
Attackers could locate PIROP gadgets even in diversified programs
8
9
Problem: Diversity is limited to what a single platform can offer.
Can we do better?
Distributed Heterogeneous N-Variant Execution
The first distributed heterogeneous NVX design
-
Variants run in different physical machines
-  Leverage ISA and ABI heterogeneity to increase diversity
10
Sources of Additional Diversity (ISA-Heterogeneity)
Machine instructions
Endianness
Register set
Pointer width
Available system calls
11
Size of primitive data types
Structs layout
-
Packing
-
Alignment
-
Padding
Constants
-
System call numbers
-
Flags and modes
Calling conventions
12
Sources of Additional Diversity (ABI-Heterogeneity)
Leader
Variant
Monitor
Kernel
13
Kernel
Follower
Variant
Monitor
Physical host 1
Physical host 2
 
s
yscall (...)
Distributed Heterogeneous NVX Design
 
s
yscall (...)
Inter-Monitor
Communication via
Network
14
Challenges
False Alarms
Performance
I
S
A
-
H
e
t
e
r
o
g
e
n
e
i
t
y
Machine instructions
Endianness
Register set
Pointer width
Available system calls
15
A
B
I
-
H
e
t
e
r
o
g
e
n
e
i
t
y
Size of primitive data types
Structs layout
-
Packing
-
Alignment
-
Padding
Constants
-
System call numbers
-
Flags and modes
Calling conventions
False Alarms
I
S
A
-
H
e
t
e
r
o
g
e
n
e
i
t
y
16
A
B
I
-
H
e
t
e
r
o
g
e
n
e
i
t
y
Additional Diversity
Size of primitive data types
Structs layout
-
Packing
-
Alignment
-
Padding
Constants
-
System call numbers
-
Flags and modes
Calling conventions
Machine instructions
Endianness
Register set
Pointer width
Available system calls
Monitoring the system call interface (NVX)
17
NVX System
Variant 1
Variant 2
Monitoring the System Call Interface (NVX)
18
NVX System
Variant 1
Variant 2
?
=
Extracted
system call
state
Extracted
system call
state
Monitoring the System Call Interface (NVX)
19
Variant 1
Variant 2
 F
Extracted
system call
state
Extracted
system call
state
NVX System
Monitoring the System Call Interface (NVX)
20
Variant 1
Variant 2
?
Extracted
system call
state
=
Extracted
system call
state
NVX System
Monitoring the System Call Interface (NVX)
21
Variant 1
Variant 2
Extracted
system call
state
Extracted
system call
state
NVX System
Monitoring the System Call Interface (NVX)
22
Variant 1
Variant 2
Extracted
system call
state
Extracted
system call
state
NVX System
?
=
Canonicalized
system call
state
Canonicalized
system call
state
Monitoring the System Call Interface (NVX)
23
Variant 1
Variant 2
Extracted
system call
state
Extracted
system call
state
NVX System
Canonicalized
system call
state
 F
Canonicalized
system call
state
24
 
system call state
 
syscall number
 
flags and modes
 
simple variables
 
complex structures
 
constant parameters
 
variable parameters
Anatomy of a System Call State
Differences at System Call Interface
System call numbers
System calls
Struct layout
Flags and modes
25
Platform-Independent State Canonicalization
(PISC)
Canonicalize constants
Canonicalize struct layout
Use semantic equivalence rules
26
Semantic Equivalence Rules (PISC)
27
open(filepath, flags, mode)
 openat(dir, filepath, flags, mode)
Physical host 1
Physical host 2
Variant 1
Variant 2
Semantic Equivalence Rules (PISC)
                                   
28
open
(filepath, flags, mode)
 
openat
(dir, filepath, flags, mode)
Physical host 1
Physical host 2
Variant 1
Variant 2
False Alarm
Semantic Equivalence Rules (PISC)
                                   
29
open
(filepath, flags, mode)
 
openat
(dir, filepath, flags, mode)
Physical host 1
Physical host 2
Variant 1
Variant 2
Functional
Equivalent
Semantic Equivalence Rules (PISC)
                                   
30
open(
filepath
, flags, mode)
 openat(
dir
,
 filepath
, flags, mode)
Physical host 1
Physical host 2
Variant 1
Variant 2
False Alarm
Semantic Equivalence Rules (PISC)
                                   
31
open(
filepath
, flags, mode)
 openat(
dir
,
 
filepath
, flags, mode)
Physical host 1
Physical host 2
Variant 1
Variant 2
Resolve absolute
file paths before
checking
Semantic Equivalence Rules (PISC)
                                   
32
open(filepath, 
flags
, 
mode
)
 openat(dir, filepath, 
flags
, 
mode
)
Physical host 1
Physical host 2
Variant 1
Variant 2
False Alarm
Semantic Equivalence Rules (PISC)
                                   
33
open(filepath, 
flags
, 
mode
)
 openat(dir, filepath, 
flags
, 
mode
)
Physical host 1
Physical host 2
Variant 1
Variant 2
Constant
Canonicalization
34
Challenges
False Alarms
Performance
Expensive Inter-Monitor Communication
Latency
-
TCP
-
Reliable UDP
-
Custom TCP/IP stack
Roundtrip time
- Avoid inter-monitor communication (when possible)
35
Optimizations
Monitoring and replication are expensive
Avoid monitoring and replication when possible
-
Selective Monitoring
-
Selective Replication
36
Leader
Variant
Monitor
Kernel
37
Kernel
Follower
Variant
Monitor
Physical host 1
Physical host 2
s
yscall
Monitoring
s
yscall
Expensive monitoring
through the network
Leader
Variant
Monitor
Kernel
38
Kernel
Follower
Variant
Monitor
Physical host 1
Physical host 2
s
yscall
Selective Monitoring
s
yscall
Expensive monitoring
through the network
Security
Sensitive System
Call
Leader
Variant
Monitor
Kernel
39
Kernel
Follower
Variant
Monitor
Physical host 1
Physical host 2
s
yscall
Selective Monitoring
s
yscall
Non-Sensitive
System Call
No monitoring
Leader
Variant
Monitor
Kernel
40
Kernel
Follower
Variant
Monitor
Physical host 1
Physical host 2
syscall
Replication
syscall
Expensive replication
of results through the
network
Leader
Variant
Monitor
Kernel
41
Kernel
Follower
Variant
Monitor
Physical host 1
Physical host 2
Selective Replication (1)
read
read
read-only file
Each Variant uses its
own copy of the file for
read-only operations.
Leader
Variant
Monitor
Kernel
42
Kernel
Follower
Variant
Monitor
Physical host 1
Physical host 2
Selective Replication (2)
syscall
syscall
Reads
immutable state
The monitor caches the
immutable state
   Security
   Performance
43
Case Study: ProFTPD SSL Private Key Leak
Hu et al. demonstrated an information 
disclosure attack on ProFTPD
-
Traverse 6 data structures using data-only gadgets, ultimately reaching a private key
A distributed heterogeneous NVX raises the bar
-
4/6 pointer fields needed for this attack are located in different offsets
44
Struct Layout Diversity
45
46
PIROP Gadget
Reduction
Less than 3.3% of PIROP gadgets
survive
Almost eliminating PIROP ABI-
dependent gadgets (0%-0.318%)
Comparison With Other NVX Systems
47
48
Alexios Voulimeneas
Email: avoulime@uci.edu
Slide Note
Embed
Share

N-Variant Execution (NVX) is a technique used to enhance security measures by running diversified program variants in parallel and comparing their outputs for transparency. NVX systems can protect against attacks relying on knowledge of virtual address spaces but have limitations against attacks based on internal program structures. Key examples include ProFTPD SSL key leakage and Position-independent Code Reuse exploits. Further exploration is needed to expand diversity beyond platform constraints.

  • N-Variant Execution
  • NVX
  • Security
  • Diversity
  • Exploits

Uploaded on Oct 09, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Distributed Heterogeneous N-Variant Execution Alexios Voulimeneas, Dokyung Song, Fabian Parzefall, Yeoul Na, Per Larsen, Michael Franz, Stijn Volckaert 1

  2. 2

  3. Solutions Type-Safe Programming Languages (e.g. Rust) Type-Safe Programming Languages (e.g. Rust) Mitigations: Integrity Enforcement (e.g. CFI) Software Diversity (e.g. ASLR) Software Diversity (e.g. ASLR) N-Variant eXecution (NVX) Mitigations: Integrity Enforcement (e.g. CFI) 3

  4. N-Variant eXecution (NVX) In a nutshell: Follower Variant Run multiple diversified program variants in parallel Leader Variant Execute these variants in lockstep on identical inputs t t Suspend them at every system call write brk brk write Compare system call numbers/arguments Monitor I/O replication for transparency and identical inputs Kernel 4

  5. What NVX Systems can do Protect Against Attacks that rely on knowledge of the target's absolute virtual address space layout Attacks that attempt to acquire that knowledge through information leakage 5

  6. What NVX Systems cannot do Protect Against Attacks that build on knowledge of the program's internal geometry (e.g., khrelative data/instruction layouts) and/or data representation 6

  7. ProFTPD SSL Private Key Leak (DOP) Hu et al. build an information disclosure attack on ProFTPD - Traverse 6 data structures using only data-only gadgets, ultimately reaching a private key 7

  8. Position-independent Code Reuse (PIROP) G ktas et al. construct code-reuse exploits that use relative locations in memory Attackers could locate PIROP gadgets even in diversified programs 8

  9. Problem: Diversity is limited to what a single platform can offer. Can we do better? 9

  10. Distributed Heterogeneous N-Variant Execution The first distributed heterogeneous NVX design - Variants run in different physical machines - Leverage ISA and ABI heterogeneity to increase diversity 10

  11. Sources of Additional Diversity (ISA-Heterogeneity) Machine instructions Endianness Register set Pointer width Available system calls 11

  12. Sources of Additional Diversity (ABI-Heterogeneity) Size of primitive data types Structs layout - Packing - Alignment - Padding Constants - System call numbers - Flags and modes Calling conventions 12

  13. Distributed Heterogeneous NVX Design Leader Variant Follower Variant syscall (...) syscall (...) Inter-Monitor Communication via Network Monitor Monitor Kernel Kernel 13 Physical host 1 Physical host 2

  14. Challenges False Alarms Performance 14

  15. False Alarms ISA ISA- -Heterogeneity Heterogeneity ABI ABI- -Heterogeneity Heterogeneity Size of primitive data types Structs layout - Packing - Alignment - Padding Constants - System call numbers - Flags and modes Calling conventions Machine instructions Endianness Register set Pointer width Available system calls 15

  16. Additional Diversity ISA ISA- -Heterogeneity Heterogeneity ABI ABI- -Heterogeneity Heterogeneity Size of primitive data types Structs layout - Packing - Alignment - Padding Constants - System call numbers - Flags and modes Calling conventions Machine instructions Endianness Register set Pointer width Available system calls 16

  17. Monitoring the system call interface (NVX) NVX System Variant 1 Variant 2 17

  18. Monitoring the System Call Interface (NVX) NVX System ? = Extracted system call state Extracted system call state Variant 1 Variant 2 18

  19. Monitoring the System Call Interface (NVX) NVX System F Extracted system call state Extracted system call state Variant 1 Variant 2 19

  20. Monitoring the System Call Interface (NVX) NVX System ? = Extracted system call state Extracted system call state Variant 1 Variant 2 20

  21. Monitoring the System Call Interface (NVX) NVX System Extracted system call state Extracted system call state Variant 1 Variant 2 21

  22. Monitoring the System Call Interface (NVX) NVX System ? = Canonicalized system call state Canonicalized system call state Extracted system call state Extracted system call state Variant 1 Variant 2 22

  23. Monitoring the System Call Interface (NVX) NVX System F Canonicalized system call state Canonicalized system call state Extracted system call state Extracted system call state Variant 1 Variant 2 23

  24. Anatomy of a System Call State system call state constant parameters variable parameters simple variables complex structures flags and modes syscall number 24

  25. Differences at System Call Interface System call numbers System calls Struct layout Flags and modes 25

  26. Platform-Independent State Canonicalization (PISC) Canonicalize constants Canonicalize struct layout Use semantic equivalence rules 26

  27. Semantic Equivalence Rules (PISC) Variant 1 open(filepath, flags, mode) Physical host 1 Variant 2 Physical host 2 openat(dir, filepath, flags, mode) 27

  28. Semantic Equivalence Rules (PISC) Variant 1 open(filepath, flags, mode) Physical host 1 False Alarm Variant 2 Physical host 2 openat(dir, filepath, flags, mode) 28

  29. Semantic Equivalence Rules (PISC) Variant 1 open(filepath, flags, mode) Physical host 1 Functional Equivalent Variant 2 Physical host 2 openat(dir, filepath, flags, mode) 29

  30. Semantic Equivalence Rules (PISC) Variant 1 open(filepath, flags, mode) Physical host 1 False Alarm Variant 2 Physical host 2 openat(dir, filepath, flags, mode) 30

  31. Semantic Equivalence Rules (PISC) Variant 1 open(filepath, flags, mode) Resolve absolute file paths before checking Physical host 1 Variant 2 Physical host 2 openat(dir, filepath, flags, mode) 31

  32. Semantic Equivalence Rules (PISC) Variant 1 open(filepath, flags, mode) Physical host 1 False Alarm Variant 2 Physical host 2 openat(dir, filepath, flags, mode) 32

  33. Semantic Equivalence Rules (PISC) Variant 1 open(filepath, flags, mode) Physical host 1 Constant Canonicalization Variant 2 Physical host 2 openat(dir, filepath, flags, mode) 33

  34. Challenges False Alarms Performance 34

  35. Expensive Inter-Monitor Communication Latency - TCP - Reliable UDP - Custom TCP/IP stack Roundtrip time - Avoid inter-monitor communication (when possible) 35

  36. Optimizations Monitoring and replication are expensive Avoid monitoring and replication when possible - Selective Monitoring - Selective Replication 36

  37. Monitoring Leader Variant Follower Variant syscall syscall Expensive monitoring through the network Monitor Monitor Kernel Kernel 37 Physical host 1 Physical host 2

  38. Selective Monitoring Leader Variant Follower Variant Security Sensitive System Call syscall syscall Expensive monitoring through the network Monitor Monitor Kernel Kernel 38 Physical host 1 Physical host 2

  39. Selective Monitoring Leader Variant Follower Variant Non-Sensitive System Call syscall syscall No monitoring Monitor Monitor Kernel Kernel 39 Physical host 1 Physical host 2

  40. Replication Leader Variant Follower Variant syscall syscall Expensive replication of results through the network Monitor Monitor Kernel Kernel 40 Physical host 1 Physical host 2

  41. Selective Replication (1) Leader Variant Follower Variant read-only file read read Each Variant uses its own copy of the file for read-only operations. Monitor Monitor Kernel Kernel 41 Physical host 1 Physical host 2

  42. Selective Replication (2) Leader Variant Follower Variant Reads immutable state syscall syscall The monitor caches the immutable state Monitor Monitor Kernel Kernel 42 Physical host 1 Physical host 2

  43. Security Performance 43

  44. Case Study: ProFTPD SSL Private Key Leak Hu et al. demonstrated an information disclosure attack on ProFTPD - Traverse 6 data structures using data-only gadgets, ultimately reaching a private key A distributed heterogeneous NVX raises the bar - 4/6 pointer fields needed for this attack are located in different offsets 44

  45. Struct Layout Diversity Benchmark Artificial DMON Nginx 1.14.2 14.52% 91.78% Lighttpd 1.4.52 12.93% 81.90% Redis 5.0.1 27.27% 75.60% ProFTPD 1.3.0 27.38% 85.71% 45

  46. PIROP Gadget Reduction Less than 3.3% of PIROP gadgets survive Almost eliminating PIROP ABI- dependent gadgets (0%-0.318%) 46

  47. Comparison With Other NVX Systems 47

  48. Alexios Voulimeneas Email: avoulime@uci.edu 48

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#