Главная
Study mode:
on
1
Intro
2
PRESENTATION OVERVIEW
3
THREE KEY VBS FEATURES BEING INTRODUCED
4
HOW DOES IT ALL WORK?
5
SEPARATION OF POWERS
6
ARCHITECTURAL LAYER OVERVIEW
7
PLATFORM REQUIREMENTS
8
HYPERVISOR-BASED CODE INTEGRITY (HVO)
9
HARD CODE GUARANTEES
10
VOCABULARY REVIEW
11
VSM / HYPERVISOR LAUNCH
12
SKM LAUNCH
13
BOOT VSM POLICY
14
BCD VSM POUCY OPTIONS
15
HYPERVISOR MSR FILTERING AND NX MMIO
16
SKM FUNCTION LAYOUT
17
SKM STRUCTURES
18
MAILBOXES
19
SKM CAPABILITIES
20
STORAGE BLORS
21
SECURE MODE CALLS
22
SECURE MODE SERVICE CALLS
23
SPECIALIZED SECURE MORE SERVICE CALLS
24
NORMAL MODE CALLS
25
NORMAL MODE SERVICE CALLS
26
UEFI RUNTIME CALLS
27
CORE IUM-EXPOSED SKM SERVICES
28
SECURE SYSTEM CALLS
29
CRYPTO SUBCALLS
30
SECURE BASE API
31
IUM SYSTEM CALLS
32
IUM SYSTEM CALL SECURITY
33
NORMAL MODE SYSTEM CALL PROKYING
34
LAUNCHING A TRUSTLET
35
TRUSTLET CRYPTOGRAPHIC REQUIREMENTS
36
TRUSTLET INSTANCE GUID
37
VIRTUAL MACHINE SECURE WORKER PROCESS
38
LOADING A TRUSTLET
39
FAKE BASE SERVER CONNECTION
40
TRUSTLET TO NORMAL WORLD COMMUNICATIONS
41
TRUSTLET ALPC ENDPOINT CONNECTIONS
42
CAN WE BUILD OUR OWN TRUSTLETS?
43
SECURE KERNEL COMPLEXITY / ATTACK SURFACE
44
COMPROMISING VBS / MISUSING VSM
45
VSM WITHOUT SECUREBOOT
46
RECOMMENDATIONS
47
YOU HAVE QUESTIONS?
Description:
Explore the radical changes to Windows 10's operating system architecture in this 52-minute Black Hat conference talk. Delve into the introduction of the Viridian Hypervisor Kernel and Virtual Secure Machines (VSMs), which implement a new Secure Kernel Mode (SKM) environment. Learn how this new model creates a paradigm where the NT Kernel runs below the Secure Kernel, and how it enables the creation of Isolated User Mode (IUM) applications. Discover the implications for security, including mitigations against Pass-the-Hash attacks and the limitations placed on even the most privileged attackers. Examine the architectural layers, platform requirements, and key features of this new system, including Hypervisor-based Code Integrity. Gain insights into the SKM function layout, capabilities, and various call types. Understand the process of launching trustlets and the security measures in place. Evaluate the complexity and potential attack surface of the Secure Kernel, and consider the possibilities for compromising or misusing VSMs. Conclude with recommendations and an opportunity for questions about this significant shift in Windows OS design. Read more

Battle of the SKM and IUM - How Windows 10 Rewrites OS Architecture

Black Hat
Add to list