SlideShare a Scribd company logo
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Turbo Talk
Jacob Torrey
@JacobTorrey
MORE SHADOW WALKER: THE
PROGRESSION OF TLB-
SPLITTING ON X86
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The overwhelming complexity of modern
computer systems create software-level
security challenges stemming from
hardware-level designs
•  Many hamper detection of and protection
from threats to your organization
Thesis
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Intel x86 provides OS method to abstract
view of memory: virtual memory / paging
Background
Virtual Memory
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Every memory access requires several memory bus
transactions to perform page translation
– This is slow!
Background
Page Translation
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The solution to this problem is to cache previous
translations in a buffer called the Translation Lookaside
Buffer (TLB)
Background
Translation Lookaside Buffer
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The CPU’s TLB is used to cache memory page
translations to increase performance.
•  De-synchronizing a CPU’s Translation Look-aside Buffer
(TLB) (e.g. Shadow Walker or PaX).
Background
TLB Splitting
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  In pre-Nehelam CPUs, the D-TLB and I-
TLB were completely separate:
Background
Intel TLB
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  A CPU’s view of memory is dependent on
how memory is being accessed
•  Anti-virus scanning memory will see one
version of memory, execution of that memory
will yield different results
•  Demonstrates differences in perceived
hardware and actual hardware
What does this mean?
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Intel releases the Nehelam architecture
(1st generation Core i-series)
•  Addition of a level 2 cache for TLB, a
shared TLB, or S-TLB
•  Previous TLB splitting tools will not work
due to this major architecture change
– Hangs in endless loop as S-TLB merges
entries
– Not enough permission granularity
End of an Era
Intel breaks TLB-splitting
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  After Nehelam, Intel introduced the shared
TLB (S-TLB):
Background
Intel S-TLB
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Now the hardware is implemented how it
is used, a full von Neumann machine
model: same view of memory for data and
code
•  End of the story?
What now?
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  We believe that the same TLB de-
synchronization used by Shadow Walker
can be used to automatically separate
data references from already existing
applications in real-time for real-time trust
measurements
MoRE
Hypothesis
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The DARPA CFT MoRE program sought
to identify if TLB splitting could be used to
detect application subjugation even if an
executable’s data and code are mixed
MoRE
Goal
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Built a custom VMX hypervisor with EPT and
VPID support that could monitor process
creation
•  Used new CPU capabilities in Nehelam+ CPUs
to “re-break” assumptions. Uses virtualization
capabilities to re-split TLB, previously thought to
be impossible on modern CPUs
MoRE
Design
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Even with the prototype nature of MoRE,
performance hits were <2%
•  Could perform periodic measurements of an
application and the MoRE system (designed
to be measurable) very rapidly – re-verifying
trust every <1/10th of a second!
•  Required no modification of application, no
recompilation or source
MoRE
Results
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  TLB-splitting is just a technique – clear
that is can be used for both offense and
defensive
•  MoRE Shadow Walker is a modification to
MoRE that allows memory hiding even
from ring 0 code
– Patch Guard?
•  Can split on arbitrary pages on Nehelam
and newer CPUs
MoRE Shadow Walker
Swinging back to the offensive
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The immense complexity of the Intel x86
ISA enables huge architectural
modifications to be effected through
software
–  Ex: Turing-complete MMU
•  Even as architecture evolves, so too does the
techniques to misuse it
–  Ex: NX bit
Conclusion
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  The code for a simple TLB splitting VMM
(for Windows 7) can be found on AIS’s
Github repository:
– http://github.com/ainfosec/MoRE
•  Released at Black Hat USA
The code
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  @grsecurity & PaX team for helping make
Linux more secure
•  @jamierbutler for helping provide
guidance on the CFP submission
•  @dotMudge and @DARPA for taking
MoRE from proposal to implementation
•  @ainfosec for letting me speak about this
very exciting research area all over the
world
Shout outs
153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
•  Thank you!
Questions?

More Related Content

Viewers also liked

Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...
Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...
Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...
Minnesota English Learner Education Conference
 
Attestation Scpo Bordaux ena
Attestation Scpo Bordaux enaAttestation Scpo Bordaux ena
Attestation Scpo Bordaux enaThibault Barb
 
Finding common ground addressing the needs of students with limited or inter...
Finding common ground  addressing the needs of students with limited or inter...Finding common ground  addressing the needs of students with limited or inter...
Finding common ground addressing the needs of students with limited or inter...
Andrea DeCapua
 
STK_CV_Marlon Banda (2)
STK_CV_Marlon Banda (2)STK_CV_Marlon Banda (2)
STK_CV_Marlon Banda (2)
Marlon Banda
 
Meeting the needs of slife de capua sc 09 03-15
Meeting the needs of slife de capua sc 09 03-15 Meeting the needs of slife de capua sc 09 03-15
Meeting the needs of slife de capua sc 09 03-15
Andrea DeCapua
 
Letter of Recommendation (Prof. of Graduate Program)
Letter of Recommendation (Prof. of Graduate Program)Letter of Recommendation (Prof. of Graduate Program)
Letter of Recommendation (Prof. of Graduate Program)林昕儒 Lilia Lin
 
Leading Learning
Leading LearningLeading Learning
Leading Learning
paulwalton78
 
Crossing Borders DeCapua 2015 Migrant & ESL Conference PA
Crossing Borders DeCapua 2015 Migrant & ESL Conference PACrossing Borders DeCapua 2015 Migrant & ESL Conference PA
Crossing Borders DeCapua 2015 Migrant & ESL Conference PA
Andrea DeCapua
 
162.«основные положения гражданского права» часть 3 «договоры, направленные н...
162.«основные положения гражданского права» часть 3 «договоры, направленные н...162.«основные положения гражданского права» часть 3 «договоры, направленные н...
162.«основные положения гражданского права» часть 3 «договоры, направленные н...ivanov15666688
 
Simanowitz Seminar in American Culture: Through the Decades
Simanowitz Seminar in American Culture: Through the DecadesSimanowitz Seminar in American Culture: Through the Decades
Simanowitz Seminar in American Culture: Through the Decades
Minnesota English Learner Education Conference
 
UH 1 konsep berfikir dalam ilmu sejarah
UH 1 konsep berfikir dalam ilmu sejarahUH 1 konsep berfikir dalam ilmu sejarah
UH 1 konsep berfikir dalam ilmu sejarah
SMA Al Muslim
 
Script for Drama
Script for DramaScript for Drama
Script for Drama
marlita101
 
Short Film Script
Short Film ScriptShort Film Script
Short Film Script
khalfyard
 

Viewers also liked (13)

Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...
Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...
Setterberg_“Heuristic” education: Ground zero for bolstering minority-languag...
 
Attestation Scpo Bordaux ena
Attestation Scpo Bordaux enaAttestation Scpo Bordaux ena
Attestation Scpo Bordaux ena
 
Finding common ground addressing the needs of students with limited or inter...
Finding common ground  addressing the needs of students with limited or inter...Finding common ground  addressing the needs of students with limited or inter...
Finding common ground addressing the needs of students with limited or inter...
 
STK_CV_Marlon Banda (2)
STK_CV_Marlon Banda (2)STK_CV_Marlon Banda (2)
STK_CV_Marlon Banda (2)
 
Meeting the needs of slife de capua sc 09 03-15
Meeting the needs of slife de capua sc 09 03-15 Meeting the needs of slife de capua sc 09 03-15
Meeting the needs of slife de capua sc 09 03-15
 
Letter of Recommendation (Prof. of Graduate Program)
Letter of Recommendation (Prof. of Graduate Program)Letter of Recommendation (Prof. of Graduate Program)
Letter of Recommendation (Prof. of Graduate Program)
 
Leading Learning
Leading LearningLeading Learning
Leading Learning
 
Crossing Borders DeCapua 2015 Migrant & ESL Conference PA
Crossing Borders DeCapua 2015 Migrant & ESL Conference PACrossing Borders DeCapua 2015 Migrant & ESL Conference PA
Crossing Borders DeCapua 2015 Migrant & ESL Conference PA
 
162.«основные положения гражданского права» часть 3 «договоры, направленные н...
162.«основные положения гражданского права» часть 3 «договоры, направленные н...162.«основные положения гражданского права» часть 3 «договоры, направленные н...
162.«основные положения гражданского права» часть 3 «договоры, направленные н...
 
Simanowitz Seminar in American Culture: Through the Decades
Simanowitz Seminar in American Culture: Through the DecadesSimanowitz Seminar in American Culture: Through the Decades
Simanowitz Seminar in American Culture: Through the Decades
 
UH 1 konsep berfikir dalam ilmu sejarah
UH 1 konsep berfikir dalam ilmu sejarahUH 1 konsep berfikir dalam ilmu sejarah
UH 1 konsep berfikir dalam ilmu sejarah
 
Script for Drama
Script for DramaScript for Drama
Script for Drama
 
Short Film Script
Short Film ScriptShort Film Script
Short Film Script
 

Similar to Jacob

OS Security Evolution & Latest Attack Vectors By Jacob Torrey
OS Security Evolution & Latest Attack Vectors  By Jacob TorreyOS Security Evolution & Latest Attack Vectors  By Jacob Torrey
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
Priyanka Aash
 
Parallel Computing - Lec 2
Parallel Computing - Lec 2Parallel Computing - Lec 2
Parallel Computing - Lec 2
Shah Zaib
 
Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_Final
Sam Knutson
 
Porting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_GriffinPorting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_Griffin
Peter Griffin
 
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335xMoksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Prabindh Sundareson
 
The Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast StorageThe Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast Storage
Kernel TLV
 
SDAccel Design Contest: Vivado HLS
SDAccel Design Contest: Vivado HLSSDAccel Design Contest: Vivado HLS
SDAccel Design Contest: Vivado HLS
NECST Lab @ Politecnico di Milano
 
Realtime traffic analyser
Realtime traffic analyserRealtime traffic analyser
Realtime traffic analyser
Alex Moskvin
 
Introduction to DSP Processors-UNIT-6
Introduction to DSP Processors-UNIT-6Introduction to DSP Processors-UNIT-6
Introduction to DSP Processors-UNIT-6
Ananda Gopathoti
 
Pune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCDPune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCD
Prashant Rane
 
Implementation strategies for digital ics
Implementation strategies for digital icsImplementation strategies for digital ics
Implementation strategies for digital ics
aroosa khan
 
Crusoe processor
Crusoe processorCrusoe processor
Crusoe processor
sanjay kumar
 
Tech trends 2018 2019
Tech trends 2018 2019Tech trends 2018 2019
Tech trends 2018 2019
Johan Norm
 
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a serviceCOMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
Antonio García-Domínguez
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
Sumutiu Marius
 
Third generation computers (hardware and software)
Third generation computers (hardware and software)Third generation computers (hardware and software)
Third generation computers (hardware and software)
La Laland
 
Integrating Things and the smart mobile phone capabilities
Integrating Things and the smart mobile phone capabilitiesIntegrating Things and the smart mobile phone capabilities
Integrating Things and the smart mobile phone capabilities
Marino Linaje Trigueros
 
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
The Linux Foundation
 
12429908.ppt
12429908.ppt12429908.ppt
12429908.ppt
ssuser4ca1eb
 
High bit rate_mul
High bit rate_mulHigh bit rate_mul
High bit rate_mul
Sidhu Sidhartha Rai
 

Similar to Jacob (20)

OS Security Evolution & Latest Attack Vectors By Jacob Torrey
OS Security Evolution & Latest Attack Vectors  By Jacob TorreyOS Security Evolution & Latest Attack Vectors  By Jacob Torrey
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
 
Parallel Computing - Lec 2
Parallel Computing - Lec 2Parallel Computing - Lec 2
Parallel Computing - Lec 2
 
Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_Final
 
Porting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_GriffinPorting_uClinux_CELF2008_Griffin
Porting_uClinux_CELF2008_Griffin
 
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335xMoksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
 
The Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast StorageThe Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast Storage
 
SDAccel Design Contest: Vivado HLS
SDAccel Design Contest: Vivado HLSSDAccel Design Contest: Vivado HLS
SDAccel Design Contest: Vivado HLS
 
Realtime traffic analyser
Realtime traffic analyserRealtime traffic analyser
Realtime traffic analyser
 
Introduction to DSP Processors-UNIT-6
Introduction to DSP Processors-UNIT-6Introduction to DSP Processors-UNIT-6
Introduction to DSP Processors-UNIT-6
 
Pune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCDPune-Cocoa: Blocks and GCD
Pune-Cocoa: Blocks and GCD
 
Implementation strategies for digital ics
Implementation strategies for digital icsImplementation strategies for digital ics
Implementation strategies for digital ics
 
Crusoe processor
Crusoe processorCrusoe processor
Crusoe processor
 
Tech trends 2018 2019
Tech trends 2018 2019Tech trends 2018 2019
Tech trends 2018 2019
 
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a serviceCOMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Third generation computers (hardware and software)
Third generation computers (hardware and software)Third generation computers (hardware and software)
Third generation computers (hardware and software)
 
Integrating Things and the smart mobile phone capabilities
Integrating Things and the smart mobile phone capabilitiesIntegrating Things and the smart mobile phone capabilities
Integrating Things and the smart mobile phone capabilities
 
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
 
12429908.ppt
12429908.ppt12429908.ppt
12429908.ppt
 
High bit rate_mul
High bit rate_mulHigh bit rate_mul
High bit rate_mul
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
Priyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Priyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
Priyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Priyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Priyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Priyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Priyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Priyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 

Jacob

  • 1. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Turbo Talk Jacob Torrey @JacobTorrey MORE SHADOW WALKER: THE PROGRESSION OF TLB- SPLITTING ON X86
  • 2. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The overwhelming complexity of modern computer systems create software-level security challenges stemming from hardware-level designs •  Many hamper detection of and protection from threats to your organization Thesis
  • 3. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Intel x86 provides OS method to abstract view of memory: virtual memory / paging Background Virtual Memory
  • 4. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Every memory access requires several memory bus transactions to perform page translation – This is slow! Background Page Translation
  • 5. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The solution to this problem is to cache previous translations in a buffer called the Translation Lookaside Buffer (TLB) Background Translation Lookaside Buffer
  • 6. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The CPU’s TLB is used to cache memory page translations to increase performance. •  De-synchronizing a CPU’s Translation Look-aside Buffer (TLB) (e.g. Shadow Walker or PaX). Background TLB Splitting
  • 7. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  In pre-Nehelam CPUs, the D-TLB and I- TLB were completely separate: Background Intel TLB
  • 8. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  A CPU’s view of memory is dependent on how memory is being accessed •  Anti-virus scanning memory will see one version of memory, execution of that memory will yield different results •  Demonstrates differences in perceived hardware and actual hardware What does this mean?
  • 9. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Intel releases the Nehelam architecture (1st generation Core i-series) •  Addition of a level 2 cache for TLB, a shared TLB, or S-TLB •  Previous TLB splitting tools will not work due to this major architecture change – Hangs in endless loop as S-TLB merges entries – Not enough permission granularity End of an Era Intel breaks TLB-splitting
  • 10. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  After Nehelam, Intel introduced the shared TLB (S-TLB): Background Intel S-TLB
  • 11. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Now the hardware is implemented how it is used, a full von Neumann machine model: same view of memory for data and code •  End of the story? What now?
  • 12. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  We believe that the same TLB de- synchronization used by Shadow Walker can be used to automatically separate data references from already existing applications in real-time for real-time trust measurements MoRE Hypothesis
  • 13. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The DARPA CFT MoRE program sought to identify if TLB splitting could be used to detect application subjugation even if an executable’s data and code are mixed MoRE Goal
  • 14. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Built a custom VMX hypervisor with EPT and VPID support that could monitor process creation •  Used new CPU capabilities in Nehelam+ CPUs to “re-break” assumptions. Uses virtualization capabilities to re-split TLB, previously thought to be impossible on modern CPUs MoRE Design
  • 15. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Even with the prototype nature of MoRE, performance hits were <2% •  Could perform periodic measurements of an application and the MoRE system (designed to be measurable) very rapidly – re-verifying trust every <1/10th of a second! •  Required no modification of application, no recompilation or source MoRE Results
  • 16. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  TLB-splitting is just a technique – clear that is can be used for both offense and defensive •  MoRE Shadow Walker is a modification to MoRE that allows memory hiding even from ring 0 code – Patch Guard? •  Can split on arbitrary pages on Nehelam and newer CPUs MoRE Shadow Walker Swinging back to the offensive
  • 17. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The immense complexity of the Intel x86 ISA enables huge architectural modifications to be effected through software –  Ex: Turing-complete MMU •  Even as architecture evolves, so too does the techniques to misuse it –  Ex: NX bit Conclusion
  • 18. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  The code for a simple TLB splitting VMM (for Windows 7) can be found on AIS’s Github repository: – http://github.com/ainfosec/MoRE •  Released at Black Hat USA The code
  • 19. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  @grsecurity & PaX team for helping make Linux more secure •  @jamierbutler for helping provide guidance on the CFP submission •  @dotMudge and @DARPA for taking MoRE from proposal to implementation •  @ainfosec for letting me speak about this very exciting research area all over the world Shout outs
  • 20. 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com •  Thank you! Questions?