SPECTRE: A dependable introspection framework via System Management Mode

  • Authors:
  • Fengwei Zhang;Kevin Leach;Kun Sun;Angelos Stavrou

  • Affiliations:
  • Center for Secure Information Systems, George Mason University, Fairfax, VA 22030, USA;Center for Secure Information Systems, George Mason University, Fairfax, VA 22030, USA;Center for Secure Information Systems, George Mason University, Fairfax, VA 22030, USA;Center for Secure Information Systems, George Mason University, Fairfax, VA 22030, USA

  • Venue:
  • DSN '13 Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Virtual Machine Introspection (VMI) systems have been widely adopted for malware detection and analysis. VMI systems use hypervisor technology for system introspection and to expose malicious activity. However, recent malware can detect the presence of virtualization or corrupt the hypervisor state thus avoiding detection. We introduce SPECTRE, a hardware-assisted dependability framework that leverages System Management Mode (SMM) to inspect the state of a system. Contrary to VMI, our trusted code base is limited to BIOS and the SMM implementations. SPECTRE is capable of transparently and quickly examining all layers of running system code including a hypervisor, the OS, and user level applications. We demonstrate several use cases of SPECTRE including heap spray, heap overflow, and rootkit detection using real-world attacks on Windows and Linux platforms. In our experiments, full inspection with SPECTRE is 100 times faster than similar VMI systems because there is no performance overhead due to virtualization.