首页> 外文会议>International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment >Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode
【24h】

Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

机译:速度与激情:从用户模式超越Windows内核通知例程

获取原文

摘要

Modern Operating Systems (OSs) enable user processes to obtain full access control over other processes initiated by the same user. In scenarios of sensitive security processes (e.g., antivirus software), protection schemes are enforced at the kernel level such as to confront arbitrary user processes overtaking with malicious intent. Within the Windows family of OSs, the kernel driver is notified via dedicated routines for user-mode processes that require protection. In such cases the kernel driver establishes a callback mechanism triggered whenever a handle request for the original user-mode process is initiated by a different user process. Subsequently, the kernel driver performs a selective permission removal process (e.g., read access to the process memory) prior to passing a handle to the requesting process. In this paper we are the first to demonstrate a fundamental user-mode process access control vulnerability, existing in Windows 7 up to the most recent Windows 10 OSs. We show that a user-mode process can indeed obtain a fully privileged access handle before the kernel driver is notified, thus prior to the callback mechanism establishment. Our study shows that this flaw can be exploited by a method to (i) disable the anti-malware suite Symantec Endpoint Protection; (ⅱ) overtake VirtualBox protected processes; (ⅲ) circumvent two major video game anti-cheat protection solutions, Bat-tlEye and EasyAntiCheat. Finally we provide recommendations on how to address the discovered vulnerability.
机译:现代操作系统(OS)使用户进程能够获得对同一用户发起的其他进程的完全访问控制。在敏感的安全过程(例如防病毒软件)的情况下,在内核级别实施保护方案,以便以恶意意图对付任何超越的用户进程。在Windows操作系统家族中,内核驱动程序通过专用例程通知需要保护的用户模式进程。在这种情况下,内核驱动程序会建立一个回调机制,只要其他用户进程启动了对原始用户模式进程的句柄请求,就会触发该回调机制。随后,内核驱动程序在将句柄传递给请求过程之前执行选择性许可删除过程(例如,对过程存储器的读取访问)。在本文中,我们是第一个演示基本的用户模式进程访问控制漏洞的工具,该漏洞存在于Windows 7和最新的Windows 10操作系统中。我们显示,在通知内核驱动程序之前,因此在建立回调机制之前,用户模式进程确实可以获取完全特权的访问句柄。我们的研究表明,可以通过以下方法利用此缺陷:(i)禁用反恶意软件套件Symantec Endpoint Protection; (ⅱ)超越受VirtualBox保护的进程; (ⅲ)规避两种主要的视频游戏反作弊保护解决方案,即Bat-tlEye和EasyAntiCheat。最后,我们提供有关如何解决发现的漏洞的建议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号