Skip to content

An enhanced mechanism for secure volume #38

@love-code-yeyixiao

Description

@love-code-yeyixiao

Disclaimer: Obviously, there is no point in trying to confront the drivers of malicious programs. However, there are some "legitimate" software that loads drivers to perform certain functions under the guise of a legitimate name. Software such as game anti-cheat will use drivers to access user files. Naturally, Microsoft doesn't issue signatures for drivers who are preoccupied with kernel-layer battles, but we also need to guard against these so-called legitimate programs accessing our files in the usual way.

If the secure disk allows all IRPs directly from the driver layer, then we need this mechanism; otherwise, we do not need it.

An enhanced mechanism can be provided to improve the security of the secure disk. A DLL is injected at the user level into the process authorized to access the disk located in the Secure Enclave. The system call level function ZwCreateFile is hooked, and a channel is established between the driver and the user layer.
The driver maintains a variable representing 'accessibility' for each secure volume. When a program plans to access data on the secure disk, the user layer notifies the driver to set the variable value to 'true', and after the access is complete, it sets it to 'false'. The driver then denies all MJ_CREATE IRP requests when the variable value is false.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions