Embedded Memory Anomaly Detection Leading to Operational Security - 2017 INMM Novel Technologies Workshop

Page created by James Hogan
 
CONTINUE READING
Embedded Memory Anomaly Detection Leading to Operational Security - 2017 INMM Novel Technologies Workshop
Embedded Memory Anomaly Detection
     Leading to Operational Security
        2017 INMM Novel Technologies Workshop

                                                               Derek Aberle
                                                                  August 30, 2017

                             Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA
Embedded Memory Anomaly Detection Leading to Operational Security - 2017 INMM Novel Technologies Workshop
Agenda

                                                   Wednesday, August 30, 2017
                                                                                     • Background
                                                               10:40 AM – 11:00 AM     – Memory resident malware
                                                                                       – Internet of Things
                                                                                       – 3900 Series Router Architecture
                Embedded Memory Anomaly
                                                                                     • R&D Example
             Detection Leading to Operational
                                                                                       – Retrieving an Image
                                    Security                                           – Manual Analysis
                     Derek Aberle
                                                                                       – Survey of COTS Tools
       A-4: Advanced Research in Cyber Systems
                                                                                       – Examining the Memory Layout
                                                                                       – Data Analytics
                                                                                     • Implications
           Derek Aberle, Joe Taylor, Richard Sisneros, Alia Long, Phil Romero          – Summary
                                                                                       – Discussion

Los Alamos National Laboratory                                                                                             10/3/2017 | 2
Embedded Memory Anomaly Detection Leading to Operational Security - 2017 INMM Novel Technologies Workshop
Memory Resident Malware

         File-less malware is written directly to the victim computer’s working memory,
         called RAM, instead of being installed on the hard drive, where it can be
         discovered by security scans.

    Persistent, difficult to detect, built-in anti-forensics

Los Alamos National Laboratory                                                            10/3/2017 | 3
Embedded Memory Anomaly Detection Leading to Operational Security - 2017 INMM Novel Technologies Workshop
Internet of Things

                                       https://cdn.pixabay.com/photo/2015/05/25/05/27/network-782707_960_720.png

    Digital is replacing analog, and everything is getting networked

Los Alamos National Laboratory                                                                                     10/3/2017 | 4
Embedded Memory Anomaly Detection Leading to Operational Security - 2017 INMM Novel Technologies Workshop
Architecture of the 3900 Series Cisco Router

         • Workstation hardware, Embedded software
              – Intel Xeon processor with 1GB RAM
              – Operates on a custom Cisco Operating system

         • Region based memory
              – Data, code, and executables live in predefined areas

         • Not secure out of the box
              – Passwords default to not encrypted?!?

         • Generic attacks fail if properly secured
              – STIG guides
              – Configuration management software

    Server hardware developed as an embedded system

Los Alamos National Laboratory                                         10/3/2017 | 5
Embedded Memory Anomaly Detection Leading to Operational Security - 2017 INMM Novel Technologies Workshop
Agenda

                                                   Wednesday, August 30, 2017
                                                                                     • Background
                                                               10:40 AM – 11:00 AM     – Memory resident malware
                                                                                       – Internet of Things
                                                                                       – 3900 Series Router Architecture
                Embedded Memory Anomaly
                                                                                     • R&D Example
             Detection Leading to Operational
                                                                                       – Retrieving an Image
                                    Security                                           – Manual Analysis
                     Derek Aberle
                                                                                       – Survey of COTS Tools
       A-4: Advanced Research in Cyber Systems
                                                                                       – Examining the Memory Layout
                                                                                       – Data Analytics
                                                                                     • Implications
           Derek Aberle, Joe Taylor, Richard Sisneros, Alia Long, Phil Romero          – Summary
                                                                                       – Discussion

Los Alamos National Laboratory                                                                                             10/3/2017 | 6
Embedded Memory Anomaly Detection Leading to Operational Security - 2017 INMM Novel Technologies Workshop
Retrieving the Memory Image

         • A router was provided by the local networking team.
         • Cisco provides support to perform a volatile memory dump.
              – 1GB of Memory
              – The “Operating System” of the device is an executable itself.
              – A Core Dump does not require an interruption of the system
         • SSH was used to copy data to local machine
         • The process can be easily automated in a defensive environment

    There is no need to “exploit” a cisco router to apply our techniques.

Los Alamos National Laboratory                                                  10/3/2017 | 7
Embedded Memory Anomaly Detection Leading to Operational Security - 2017 INMM Novel Technologies Workshop
Manual Analysis

         • We utilized standard Linux utilities
         • Examined open source tools for memory analysis
              – Router tools are obsolete and/or no longer supported
              – The source contained some “hints” which saved us time

    Defensively, Cisco memory dumps are easy to get, and are not encrypted.

Los Alamos National Laboratory                                                10/3/2017 | 8
Manual Analysis (cont.)

           What hardware are we looking at?

                                 What kind of software can we look for?

           Where is the code and data hiding?

    A roadmap of how to analyze the memory image.

Los Alamos National Laboratory                                            10/3/2017 | 9
Survey of Commercial Off The Shelf Tools

         • We examined three commonly used tools.
              – NAFT, EnCase, and Volatility
         • These guys make money on desktop systems
              – Currently, very little support for “Internet of Things” devices.
              – There are too many devices to expect a vendor to cover them all
         • Great at finding hardware independent information
              – They can be used to find certificates, keys, packets, etc..
         • Not so great at anything else
              – Failed at finding process table, anomaly detection, configuration changes

    These should be part of an analyst toolkit, not what defines it.

Los Alamos National Laboratory                                                              10/3/2017 | 10
Examining the Memory Layout

       • Begin memory – Top row
            – 1MB
       • Text region – blue
            – Code: 100 MB
       • Data region – yellow
            – Variables: 100 MB
       • BSS region – orange
            – More variables:11MB
       • Heap region – red
            – Storage: 820 MB
       • Empty region – gray
            – Addons: 32 MB

    Region based memory has defined addresses that are not random.

Los Alamos National Laboratory                                       10/3/2017 | 11
Data Analytics (and future Anomaly Detection)

            The above image shows bar heights proportional to the average (mean) value for each
            1024 byte block and is colored by the standard deviation for the memory block.

    Patterns are clearly encoded in the memory.

Los Alamos National Laboratory                                                               10/3/2017 | 12
Agenda

                                                   Wednesday, August 30, 2017
                                                                                     • Background
                                                               10:40 AM – 11:00 AM     – Memory resident malware
                                                                                       – Internet of Things
                                                                                       – 3900 Series Router Architecture
                Embedded Memory Anomaly
                                                                                     • R&D Example
             Detection Leading to Operational
                                                                                       – Retrieving an Image
                                    Security                                           – Manual Analysis
                     Derek Aberle
                                                                                       – Survey of COTS Tools
       A-4: Advanced Research in Cyber Systems
                                                                                       – Examining the Memory Layout
                                                                                       – Data Analytics
                                                                                     • Implications
           Derek Aberle, Joe Taylor, Richard Sisneros, Alia Long, Phil Romero          – Summary
                                                                                       – Discussion

Los Alamos National Laboratory                                                                                             10/3/2017 | 13
Summary

         • Commercial off the Shelf solutions are not bullet proof.
              – They can be used, but won’t do the job for you.
         • The primary risk is with unsecured routers.
              – Properly secured, updated, and configured systems are substantially less vulnerable.
              – Assuming the System Admin correctly configured the system costs banks millions.
         • The data is available to examine devices.
              – Live forensics can provide new information not currently utilized operationally.
              – We can automate the majority of the process to provide a tool.
         • There are other possible paths of research.
              – Machine learning algorithms could identify anomalies.
              – The analytics developed would apply to other embedded hardware as well.

    There are several paths for future work

Los Alamos National Laboratory                                                                     10/3/2017 | 14
Questions, Discussion?

                                   Thank you!

    There are several paths for future work

Los Alamos National Laboratory                  10/3/2017 | 15
You can also read