Unauthorized data alteration has been a longstanding threat since the emergence of malware. System and application software can be reinstalled and hardware can be replaced, but user data is priceless in many cases. Especially in recent years, ransomware has become high-impact due to its direct monetization model. State-of-the-art defenses are mostly based on known signature or behavior analysis, and more importantly, require an uncompromised OS kernel. However, malware with the highest software privileges has shown its obvious existence. We propose to move from current detection/recovery based mechanisms to data loss prevention, where the focus is on armoring data instead of counteracting malware. Our solution, Inuksuk, relies on today's Trusted Execution Environments (TEEs), as available both on the CPU and storage device, to achieve programmable write protection. We back up a copy of user-selected files as write-protected at all times, and subsequent updates are written as new versions securely through TEE. We implement Inuksuk on Windows 7 and 10, and Linux (Ubuntu); our core design is OS and application agnostic, and incurs no run-time performance penalty for applications. File transfer disruption can be eliminated or alleviated through access modes and customizable update policies (e.g., interval, granularity). For Inuksuk's adoptability in modern OSes, we have also ported Flicker (EuroSys 2008), a defacto standard tool for in-OS privileged TEE management, to the latest 64-bit Windows.
翻译:自恶意软件出现以来,未经授权的数据改变一直是一个长期的威胁。系统和应用软件可以重新整合,硬件可以替换,但在许多情况下,用户数据是无价的。特别是近年来,赎金软件因其直接货币化模式而变得影响很大。最先进的防御设备大多基于已知的签名或行为分析,更重要的是,需要一套未经整合的OS内核。然而,软件权限最高的恶意软件已经明显存在。我们提议从目前的检测/回收机制转向数据丢失预防,重点是安装数据,而不是反恶意软件。我们的解决方案Inuksukuk,依靠今天的信赖的执行环境(TEEE),而这种环境存在于CPU和存储装置上,可以实现可编程的书写保护。我们支持用户选择的文件的副本,并随后通过TEE将最新版本写入。我们在Windows 7 和 10 以及 Linuks (Ubuntututoward) 执行Informission EloiOS 应用软件,也可以在软 OFlistal-deforstal 上升级。