Patch auditing in infrastructure as a service clouds

  • Authors:
  • Lionel Litty;David Lie

  • Affiliations:
  • VMware, Inc., Palo Alto, CA, USA;University of Toronto, Toronto, ON, Canada

  • Venue:
  • Proceedings of the 7th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

A basic requirement of a secure computer system is that it be up to date with regard to software security patches. Unfortunately, Infrastructure as a Service (IaaS) clouds make this difficult. They leverage virtualization, which provides functionality that causes traditional security patch update systems to fail. In addition, the diversity of operating systems and the distributed nature of administration in the cloud compound the problem of identifying unpatched machines. In this work, we propose P2, a hypervisor-based patch audit solution. P2 audits VMs and detects the execution of unpatched binary and non-binary files in an accurate, continuous and OSagnostic manner. Two key innovations make P2 possible. First, P2 uses efficient information flow tracking to identify the use of unpatched non-binary files in a vulnerable way.We performed a patch survey and discover that 64% of files modified by security updates do not contain binary code, making the audit of non-binary files crucial. Second, P2 implements a novel algorithm that identifies binaries in mid-execution to allow handling of VMs resumed from a checkpoint or migrated into the cloud. We have implemented a prototype of P2 and and our experiments show that it accurately reports the execution of unpatched code while imposing performance overhead of 4%.