MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel

05/23/2019
by   Igor Korkin, et al.
0

Windows OS kernel memory is one of the main targets of cyber-attacks. By launching such attacks, hackers are succeeding in process privilege escalation and tampering with users data by accessing kernel mode memory. This paper considers a new example of such an attack, which results in access to the files opened in an exclusive mode. Windows built-in security features prevent such legal access, but attackers can circumvent them by patching dynamically allocated objects. The research shows that the Windows 10, version 1809 x64 is vulnerable to this attack. The paper provides an example of using MemoryRanger, a hypervisor-based solution to prevent such attack by running kernel-mode drivers in isolated kernel memory enclaves.

READ FULL TEXT

page 2

page 6

page 7

research
06/10/2021

Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again

The security of a computer system depends on OS kernel protection. It is...
research
10/06/2022

Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV

Windows OS is facing a huge rise in kernel attacks. An overview of popul...
research
12/24/2018

Divide et Impera: MemoryRanger Runs Drivers in Isolated Kernel Spaces

One of the main issues in the OS security is to provide trusted code exe...
research
05/20/2020

A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel Attack

Nowadays, in operating systems, numerous protection mechanisms prevent o...
research
06/13/2023

An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection

In organizations, employees work with information stored in files accord...
research
01/22/2016

HyBIS: Windows Guest Protection through Advanced Memory Introspection

Effectively protecting the Windows OS is a challenging task, since most ...
research
01/20/2022

spotFuzzer: Static Instrument and Fuzzing Windows COTs

The security research on Windows has received little attention in the ac...

Please sign up or login with your details

Forgot password? Click here to reset