SlideShare a Scribd company logo
1 of 20
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Turbo Talk
Jacob Torrey
@JacobTorrey
MORE SHADOW WALKER: THE
PROGRESSION OF TLB-
SPLITTING ON X86
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The overwhelming complexity of modern
computer systems create software-level
security challenges stemming from
hardware-level designs
•  Many hamper detection of and protection
from threats to your organization
Thesis
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Intel x86 provides OS method to abstract
view of memory: virtual memory / paging
Background
Virtual Memory
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Every memory access requires several memory bus
transactions to perform page translation
– This is slow!
Background
Page Translation
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The solution to this problem is to cache previous
translations in a buffer called the Translation Lookaside
Buffer (TLB)
Background
Translation Lookaside Buffer
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The CPU’s TLB is used to cache memory page
translations to increase performance.
•  De-synchronizing a CPU’s Translation Look-aside Buffer
(TLB) (e.g. Shadow Walker or PaX).
Background
TLB Splitting
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  In pre-Nehelam CPUs, the D-TLB and I-
TLB were completely separate:
Background
Intel TLB
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  A CPU’s view of memory is dependent on
how memory is being accessed
•  Anti-virus scanning memory will see one
version of memory, execution of that memory
will yield different results
•  Demonstrates differences in perceived
hardware and actual hardware
What does this mean?
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Intel releases the Nehelam architecture
(1st generation Core i-series)
•  Addition of a level 2 cache for TLB, a
shared TLB, or S-TLB
•  Previous TLB splitting tools will not work
due to this major architecture change
– Hangs in endless loop as S-TLB merges
entries
– Not enough permission granularity
End of an Era
Intel breaks TLB-splitting
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  After Nehelam, Intel introduced the shared
TLB (S-TLB):
Background
Intel S-TLB
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Now the hardware is implemented how it
is used, a full von Neumann machine
model: same view of memory for data and
code
•  End of the story?
What now?
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  We believe that the same TLB de-
synchronization used by Shadow Walker
can be used to automatically separate
data references from already existing
applications in real-time for real-time trust
measurements
MoRE
Hypothesis
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The DARPA CFT MoRE program sought
to identify if TLB splitting could be used to
detect application subjugation even if an
executable’s data and code are mixed
MoRE
Goal
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Built a custom VMX hypervisor with EPT and
VPID support that could monitor process
creation
•  Used new CPU capabilities in Nehelam+ CPUs
to “re-break” assumptions. Uses virtualization
capabilities to re-split TLB, previously thought to
be impossible on modern CPUs
MoRE
Design
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Even with the prototype nature of MoRE,
performance hits were <2%
•  Could perform periodic measurements of an
application and the MoRE system (designed
to be measurable) very rapidly – re-verifying
trust every <1/10th of a second!
•  Required no modification of application, no
recompilation or source
MoRE
Results
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  TLB-splitting is just a technique – clear
that is can be used for both offense and
defensive
•  MoRE Shadow Walker is a modification to
MoRE that allows memory hiding even
from ring 0 code
– Patch Guard?
•  Can split on arbitrary pages on Nehelam
and newer CPUs
MoRE Shadow Walker
Swinging back to the offensive
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The immense complexity of the Intel x86
ISA enables huge architectural
modifications to be effected through
software
–  Ex: Turing-complete MMU
•  Even as architecture evolves, so too does the
techniques to misuse it
–  Ex: NX bit
Conclusion
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The code for a simple TLB splitting VMM
(for Windows 7) can be found on AIS’s
Github repository:
– http://github.com/ainfosec/MoRE
•  Released at Black Hat USA
The code
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  @grsecurity & PaX team for helping make
Linux more secure
•  @jamierbutler for helping provide
guidance on the CFP submission
•  @dotMudge and @DARPA for taking
MoRE from proposal to implementation
•  @ainfosec for letting me speak about this
very exciting research area all over the
world
Shout outs
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Thank you!
Questions?

More Related Content

Viewers also liked

Attestation Scpo Bordaux ena
Attestation Scpo Bordaux enaAttestation Scpo Bordaux ena
Attestation Scpo Bordaux enaThibault Barb
 
Finding common ground addressing the needs of students with limited or inter...
Finding common ground  addressing the needs of students with limited or inter...Finding common ground  addressing the needs of students with limited or inter...
Finding common ground addressing the needs of students with limited or inter...Andrea DeCapua
 
STK_CV_Marlon Banda (2)
STK_CV_Marlon Banda (2)STK_CV_Marlon Banda (2)
STK_CV_Marlon Banda (2)Marlon Banda
 
Meeting the needs of slife de capua sc 09 03-15
Meeting the needs of slife de capua sc 09 03-15 Meeting the needs of slife de capua sc 09 03-15
Meeting the needs of slife de capua sc 09 03-15 Andrea DeCapua
 
Letter of Recommendation (Prof. of Graduate Program)
Letter of Recommendation (Prof. of Graduate Program)Letter of Recommendation (Prof. of Graduate Program)
Letter of Recommendation (Prof. of Graduate Program)林昕儒 Lilia Lin
 
Crossing Borders DeCapua 2015 Migrant & ESL Conference PA
Crossing Borders DeCapua 2015 Migrant & ESL Conference PACrossing Borders DeCapua 2015 Migrant & ESL Conference PA
Crossing Borders DeCapua 2015 Migrant & ESL Conference PAAndrea DeCapua
 
162.«основные положения гражданского права» часть 3 «договоры, направленные н...
162.«основные положения гражданского права» часть 3 «договоры, направленные н...162.«основные положения гражданского права» часть 3 «договоры, направленные н...
162.«основные положения гражданского права» часть 3 «договоры, направленные н...ivanov15666688
 
UH 1 konsep berfikir dalam ilmu sejarah
UH 1 konsep berfikir dalam ilmu sejarahUH 1 konsep berfikir dalam ilmu sejarah
UH 1 konsep berfikir dalam ilmu sejarahSMA Al Muslim
 
Script for Drama
Script for DramaScript for Drama
Script for Dramamarlita101
 
Short Film Script
Short Film ScriptShort Film Script
Short Film Scriptkhalfyard
 

Viewers also liked (13)

Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...
Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...
Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...
 
Attestation Scpo Bordaux ena
Attestation Scpo Bordaux enaAttestation Scpo Bordaux ena
Attestation Scpo Bordaux ena
 
Finding common ground addressing the needs of students with limited or inter...
Finding common ground  addressing the needs of students with limited or inter...Finding common ground  addressing the needs of students with limited or inter...
Finding common ground addressing the needs of students with limited or inter...
 
STK_CV_Marlon Banda (2)
STK_CV_Marlon Banda (2)STK_CV_Marlon Banda (2)
STK_CV_Marlon Banda (2)
 
Meeting the needs of slife de capua sc 09 03-15
Meeting the needs of slife de capua sc 09 03-15 Meeting the needs of slife de capua sc 09 03-15
Meeting the needs of slife de capua sc 09 03-15
 
Letter of Recommendation (Prof. of Graduate Program)
Letter of Recommendation (Prof. of Graduate Program)Letter of Recommendation (Prof. of Graduate Program)
Letter of Recommendation (Prof. of Graduate Program)
 
Leading Learning
Leading LearningLeading Learning
Leading Learning
 
Crossing Borders DeCapua 2015 Migrant & ESL Conference PA
Crossing Borders DeCapua 2015 Migrant & ESL Conference PACrossing Borders DeCapua 2015 Migrant & ESL Conference PA
Crossing Borders DeCapua 2015 Migrant & ESL Conference PA
 
162.«основные положения гражданского права» часть 3 «договоры, направленные н...
162.«основные положения гражданского права» часть 3 «договоры, направленные н...162.«основные положения гражданского права» часть 3 «договоры, направленные н...
162.«основные положения гражданского права» часть 3 «договоры, направленные н...
 
Simanowitz Seminar in American Culture: Through the Decades
Simanowitz Seminar in American Culture: Through the DecadesSimanowitz Seminar in American Culture: Through the Decades
Simanowitz Seminar in American Culture: Through the Decades
 
UH 1 konsep berfikir dalam ilmu sejarah
UH 1 konsep berfikir dalam ilmu sejarahUH 1 konsep berfikir dalam ilmu sejarah
UH 1 konsep berfikir dalam ilmu sejarah
 
Script for Drama
Script for DramaScript for Drama
Script for Drama
 
Short Film Script
Short Film ScriptShort Film Script
Short Film Script
 

Similar to Jacob

OS Security Evolution & Latest Attack Vectors By Jacob Torrey
OS Security Evolution & Latest Attack Vectors  By Jacob TorreyOS Security Evolution & Latest Attack Vectors  By Jacob Torrey
OS Security Evolution & Latest Attack Vectors By Jacob TorreyPriyanka Aash
 
Parallel Computing - Lec 2
Parallel Computing - Lec 2Parallel Computing - Lec 2
Parallel Computing - Lec 2Shah Zaib
 
Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_FinalSam Knutson
 
Porting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_GriffinPorting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_GriffinPeter Griffin
 
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335xMoksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335xPrabindh Sundareson
 
The Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast StorageThe Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast StorageKernel TLV
 
Realtime traffic analyser
Realtime traffic analyserRealtime traffic analyser
Realtime traffic analyserAlex Moskvin
 
Introduction to DSP Processors-UNIT-6
Introduction to DSP Processors-UNIT-6Introduction to DSP Processors-UNIT-6
Introduction to DSP Processors-UNIT-6Ananda Gopathoti
 
Pune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCDPune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCDPrashant Rane
 
Implementation strategies for digital ics
Implementation strategies for digital icsImplementation strategies for digital ics
Implementation strategies for digital icsaroosa khan
 
Tech trends 2018 2019
Tech trends 2018 2019Tech trends 2018 2019
Tech trends 2018 2019Johan Norm
 
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a serviceCOMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a serviceAntonio García-Domínguez
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.Sumutiu Marius
 
Third generation computers (hardware and software)
Third generation computers (hardware and software)Third generation computers (hardware and software)
Third generation computers (hardware and software)La Laland
 
Integrating Things and the smart mobile phone capabilities
Integrating Things and the smart mobile phone capabilitiesIntegrating Things and the smart mobile phone capabilities
Integrating Things and the smart mobile phone capabilitiesMarino Linaje Trigueros
 
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...The Linux Foundation
 

Similar to Jacob (20)

OS Security Evolution & Latest Attack Vectors By Jacob Torrey
OS Security Evolution & Latest Attack Vectors  By Jacob TorreyOS Security Evolution & Latest Attack Vectors  By Jacob Torrey
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
 
Parallel Computing - Lec 2
Parallel Computing - Lec 2Parallel Computing - Lec 2
Parallel Computing - Lec 2
 
Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_Final
 
Porting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_GriffinPorting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_Griffin
 
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335xMoksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
 
The Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast StorageThe Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast Storage
 
SDAccel Design Contest: Vivado HLS
SDAccel Design Contest: Vivado HLSSDAccel Design Contest: Vivado HLS
SDAccel Design Contest: Vivado HLS
 
Realtime traffic analyser
Realtime traffic analyserRealtime traffic analyser
Realtime traffic analyser
 
Introduction to DSP Processors-UNIT-6
Introduction to DSP Processors-UNIT-6Introduction to DSP Processors-UNIT-6
Introduction to DSP Processors-UNIT-6
 
Pune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCDPune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCD
 
Implementation strategies for digital ics
Implementation strategies for digital icsImplementation strategies for digital ics
Implementation strategies for digital ics
 
Crusoe processor
Crusoe processorCrusoe processor
Crusoe processor
 
Tech trends 2018 2019
Tech trends 2018 2019Tech trends 2018 2019
Tech trends 2018 2019
 
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a serviceCOMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Third generation computers (hardware and software)
Third generation computers (hardware and software)Third generation computers (hardware and software)
Third generation computers (hardware and software)
 
Integrating Things and the smart mobile phone capabilities
Integrating Things and the smart mobile phone capabilitiesIntegrating Things and the smart mobile phone capabilities
Integrating Things and the smart mobile phone capabilities
 
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
 
12429908.ppt
12429908.ppt12429908.ppt
12429908.ppt
 
High bit rate_mul
High bit rate_mulHigh bit rate_mul
High bit rate_mul
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

Jacob

  • 1. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Turbo Talk Jacob Torrey @JacobTorrey MORE SHADOW WALKER: THE PROGRESSION OF TLB- SPLITTING ON X86
  • 2. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The overwhelming complexity of modern computer systems create software-level security challenges stemming from hardware-level designs •  Many hamper detection of and protection from threats to your organization Thesis
  • 3. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Intel x86 provides OS method to abstract view of memory: virtual memory / paging Background Virtual Memory
  • 4. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Every memory access requires several memory bus transactions to perform page translation – This is slow! Background Page Translation
  • 5. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The solution to this problem is to cache previous translations in a buffer called the Translation Lookaside Buffer (TLB) Background Translation Lookaside Buffer
  • 6. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The CPU’s TLB is used to cache memory page translations to increase performance. •  De-synchronizing a CPU’s Translation Look-aside Buffer (TLB) (e.g. Shadow Walker or PaX). Background TLB Splitting
  • 7. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  In pre-Nehelam CPUs, the D-TLB and I- TLB were completely separate: Background Intel TLB
  • 8. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  A CPU’s view of memory is dependent on how memory is being accessed •  Anti-virus scanning memory will see one version of memory, execution of that memory will yield different results •  Demonstrates differences in perceived hardware and actual hardware What does this mean?
  • 9. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Intel releases the Nehelam architecture (1st generation Core i-series) •  Addition of a level 2 cache for TLB, a shared TLB, or S-TLB •  Previous TLB splitting tools will not work due to this major architecture change – Hangs in endless loop as S-TLB merges entries – Not enough permission granularity End of an Era Intel breaks TLB-splitting
  • 10. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  After Nehelam, Intel introduced the shared TLB (S-TLB): Background Intel S-TLB
  • 11. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Now the hardware is implemented how it is used, a full von Neumann machine model: same view of memory for data and code •  End of the story? What now?
  • 12. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  We believe that the same TLB de- synchronization used by Shadow Walker can be used to automatically separate data references from already existing applications in real-time for real-time trust measurements MoRE Hypothesis
  • 13. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The DARPA CFT MoRE program sought to identify if TLB splitting could be used to detect application subjugation even if an executable’s data and code are mixed MoRE Goal
  • 14. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Built a custom VMX hypervisor with EPT and VPID support that could monitor process creation •  Used new CPU capabilities in Nehelam+ CPUs to “re-break” assumptions. Uses virtualization capabilities to re-split TLB, previously thought to be impossible on modern CPUs MoRE Design
  • 15. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Even with the prototype nature of MoRE, performance hits were <2% •  Could perform periodic measurements of an application and the MoRE system (designed to be measurable) very rapidly – re-verifying trust every <1/10th of a second! •  Required no modification of application, no recompilation or source MoRE Results
  • 16. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  TLB-splitting is just a technique – clear that is can be used for both offense and defensive •  MoRE Shadow Walker is a modification to MoRE that allows memory hiding even from ring 0 code – Patch Guard? •  Can split on arbitrary pages on Nehelam and newer CPUs MoRE Shadow Walker Swinging back to the offensive
  • 17. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The immense complexity of the Intel x86 ISA enables huge architectural modifications to be effected through software –  Ex: Turing-complete MMU •  Even as architecture evolves, so too does the techniques to misuse it –  Ex: NX bit Conclusion
  • 18. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The code for a simple TLB splitting VMM (for Windows 7) can be found on AIS’s Github repository: – http://github.com/ainfosec/MoRE •  Released at Black Hat USA The code
  • 19. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  @grsecurity & PaX team for helping make Linux more secure •  @jamierbutler for helping provide guidance on the CFP submission •  @dotMudge and @DARPA for taking MoRE from proposal to implementation •  @ainfosec for letting me speak about this very exciting research area all over the world Shout outs
  • 20. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Thank you! Questions?