Tesla.Angela 发表于 2017-5-17 19:40:42

[科普]WIN10(1607)之后PatchGuard有了兄弟HyperGuard

相比起内核明星PatchGuard,HyperGuard可谓完全没有知名度。直到最近,Mark E .Russinovich才在一本新书里宣告了它的存在,并做了如下描述:On systems that run with virtualization-based security (described earlier in this chapter in the section
“Virtualization-based security”), it is no longer true that attackers with kernel-mode privileges are essentially
running at the same security boundary as a detection/prevention mechanism. In fact, such attackers
would operate at VTL 0, while a mechanism could be implemented in VTL 1. In the Anniversary
Update of Windows 10 (version 1607), such a mechanism does indeed exist, which is appropriately
named HyperGuard. HyperGuard has a few interesting properties that set it apart from PatchGuard:
■ It does not need to rely on obfuscation. The symbol files and function names that implement
HyperGuard are available for anyone to see, and the code is not obfuscated. Complete static
analysis is possible. This is because HyperGuard is a true security boundary.
■ It does not need to operate non-deterministically because this would provide no advantage
due to the preceding property. In fact, by operating deterministically, HyperGuard can crash
the system at the precise time unwanted behavior is detected. This means crash data will contain
clear and actionable data for the administrator (and Microsoft’s analysis teams), such as the
kernel stack, which will show the code that performed the undesirable behavior.
■ Due to the preceding property, it can detect a wider variety of attacks, because the malicious
code does not have the chance to restore a value back to its correct value during a precise time
window, which is an unfortunate side-effect of PatchGuard’s non-determinism.
HyperGuard is also used to extend PatchGuard’s capabilities in certain ways, and to strengthen its
ability to run undetected by attackers trying to disable it. When HyperGuard detects an inconsistency,
it too will crash the system, albeit with a different code: 0x18C (HYPERGUARD_VIOLATION). As before, it
might be valuable to understand, at a generic level, what kind of things HyperGuard will detect, which
you can see in Table 7-24.

On systems with VBS enabled, there is another security-related feature that is worth describing,
which is implemented in the hypervisor itself: Non-Privileged Instruction Execution Prevention (NPIEP).
This mitigation targets specific x64 instructions that can be used to leak the kernel-mode addresses of
the GDT, IDT, and LDT, which are SGDT, SIDT, and SLDT. With NPIEP, these instructions are still allowed
to execute (due to compatibility concerns), but will return a per-processor unique number that is not
actually the kernel address of these structures. This serves as a mitigation against Kernel ASLR (KASLR)
information leaks from local attackers.
Finally, note that there is no way to disable PatchGuard or HyperGuard once they are enabled.
However, because device-driver developers might need to make changes to a running system as part
of debugging, PatchGuard is not enabled when the system boots in debugging mode with an active
remote kernel-debugging connection. Similarly, HyperGuard is disabled if the hypervisor boots in
debugging mode with a remote debugger attached.如果懒得看英语,我就简单总结几句:**** Hidden Message *****这本新书的名字是:**** Hidden Message *****

3207145141 发表于 2017-5-17 19:44:22

学习大牛的翻译

kz丶cn 发表于 2017-5-17 19:44:35

搞起搞起

meesong 发表于 2017-5-17 19:44:38

学习,感谢!

linkerrors 发表于 2017-5-17 19:45:08

感谢分享!

46785131 发表于 2017-5-17 19:47:09

不是懒 得看。是看也看不懂。!~~

vashonxuan 发表于 2017-5-17 19:52:04

学习

aa116688aa024 发表于 2017-5-17 20:06:51

求看翻译!

basketwill 发表于 2017-5-17 20:08:41

什么名字

shen1l 发表于 2017-5-17 20:10:58

如此强大!!!!!!!!

xtfpg 发表于 2017-5-17 20:26:36

123

a195097 发表于 2017-5-17 20:44:37

学习

flac 发表于 2017-5-17 20:49:00

新的东西越来越多啊

zjr230506 发表于 2017-5-17 21:44:16

看看学习

0xAA55 发表于 2017-5-17 21:54:55

哇!嗯虽说英文看得懂。。

ZeroAccess 发表于 2017-5-17 22:03:25

学习!

NOW刘 发表于 2017-5-17 22:13:03

一项来 直接看总结=-=。

tongpeng 发表于 2017-5-17 23:04:58

支持一下

beilier 发表于 2017-5-17 23:32:47

我就是有中文就不看英文的孩子~

CleanLove 发表于 2017-5-17 23:54:25

学习,感谢!

xwtwhonew 发表于 2017-5-18 07:53:49

直接来看翻译了

125096 发表于 2017-5-18 08:52:29

搞起搞起

李梓羿 发表于 2017-5-18 09:11:08

感谢TA大神的分享,学习了!!!

284406022 发表于 2017-5-18 09:25:51

楼主英文真好

yifi 发表于 2017-5-18 11:15:33

谢谢楼主分享

163xlt 发表于 2017-5-18 18:27:27

英文看不懂

lily2997 发表于 2017-5-19 17:35:22

感谢分享

plf2003 发表于 2017-5-20 08:50:43

看看新guard

dejavu 发表于 2017-5-20 11:05:46

还是看翻译吧,英文有点累

o7781693 发表于 2017-5-20 12:57:38

kz丶cn 发表于 2017-5-17 19:44
搞起搞起


搞起搞起

thone 发表于 2017-5-21 20:10:26

新书的名字估计是windows internal 第七版

hzmnue 发表于 2017-5-23 09:42:45

啊啊啊啊啊
页: [1] 2 3 4
查看完整版本: [科普]WIN10(1607)之后PatchGuard有了兄弟HyperGuard