论文标题
Microsoft Defender将被捍卫:MemoryRanger防止盲目的Windows AV
Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV
论文作者
论文摘要
Windows OS面临内核攻击的巨大增长。将介绍导致加载内核驱动程序的流行技术的概述。现代威胁的关键目标之一是使Microsoft Defender(默认的Windows AV)禁用和盲目。将对最近的基于驾驶员的攻击进行分析,挑战是阻止它们。将对对Microsoft Defender的用户和内核级攻击进行调查。最近发表的攻击者技术之一通过通过SYSCALL修改Microsoft Defender的完整性级别和调试特权,滥用强制性完整性控制(MIC)和安全参考监视器(SRM)。但是,可以通过Windows的“信任标签”机制阻止此用户模式攻击。提出的论文发现了MIC和SRM的内部,包括在恶意软件检测过程中对Microsoft Defender进行分析。我们展示了攻击者如何使用内核模式驱动程序攻击Microsoft Defender。该驱动程序修改了为Microsoft Defender应用程序分配的令牌结构的字段。提出的攻击导致了Microsoft Defender的禁用,而无需终止其任何过程,而没有触发任何Windows安全功能,例如PatchGuard。定制的基于管理程序的解决方案名为MemoryRanger用于保护Windows Defender内核结构。实验表明,内存范围成功地限制了从非法访问尝试中访问敏感内核数据的访问,并具有负担得起的性能退化。
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. However, this user-mode attack can be blocked via the Windows 'trust labels' mechanism. The presented paper discovered the internals of MIC and SRM, including the analysis of Microsoft Defender during malware detection. We show how attackers can attack Microsoft Defender using a kernel-mode driver. This driver modifies the fields of the Token structure allocated for the Microsoft Defender application. The presented attack resulted in disabling Microsoft Defender, without terminating any of its processes and without triggering any Windows security features, such as PatchGuard. The customized hypervisor-based solution named MemoryRanger was used to protect the Windows Defender kernel structures. The experiments show that MemoryRanger successfully restricts access to the sensitive kernel data from illegal access attempts with affordable performance degradation.