One of the main issues in the OS security is to provide trusted code execution in an untrusted environment. During executing, kernel-mode drivers allocate and process memory data: OS internal structures, users private information, and sensitive data of third-party drivers. All this data and the drivers code can be tampered with by kernel-mode malware. Microsoft security experts integrated new features to fill this gap, but they are not enough: allocated data can be stolen and patched and the drivers code can be dumped without any security reaction. The proposed hypervisor-based system (MemoryRanger) tackles this issue by executing drivers in separate kernel enclaves with specific memory attributes. MemoryRanger protects code and data using Intel VT-x and EPT features with low performance degradation on Windows 10 x64.
翻译:OS安全的主要问题之一是在不受信任的环境中提供可信赖的代码执行。 执行过程中, 内核模式驱动器分配和处理内存数据: OS内部结构、 用户私人信息和第三方驱动器的敏感数据。 所有这些数据和驱动器代码都可以被内核模式恶意软件篡改。 微软安全专家整合了新的功能来填补这一空白, 但这些功能还不够: 分配的数据可以被盗和补丁, 驱动器代码可以在没有任何安全反应的情况下被丢弃。 拟议的超视仪系统( MemoryRanger)通过在具有特定内存特性的单独的内核飞地执行驱动器来解决这个问题。 内射镜保护代码和数据使用视窗 10 x64 低性能的英特尔VTx 和 EPT 功能。