{"id":670932,"date":"2020-07-06T11:15:30","date_gmt":"2020-07-06T18:15:30","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?p=670932"},"modified":"2024-02-14T15:36:55","modified_gmt":"2024-02-14T23:36:55","slug":"toward-trusted-sensing-for-the-cloud-introducing-project-freta","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/research\/blog\/toward-trusted-sensing-for-the-cloud-introducing-project-freta\/","title":{"rendered":"Toward trusted sensing for the cloud: Introducing Project Freta"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-671769 size-full\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2.png\" alt=\"Representative image shows a light source directing light at a square which reveals lines of binary code some of which are green and some of which are red. \" width=\"5834\" height=\"3284\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2.png 5834w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-300x169.png 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1024x576.png 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-768x432.png 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1536x865.png 1536w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-2048x1153.png 2048w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1066x600.png 1066w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-655x368.png 655w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-343x193.png 343w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-640x360.png 640w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-960x540.png 960w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1280x720.png 1280w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1920x1080.png 1920w\" sizes=\"auto, (max-width: 5834px) 100vw, 5834px\" \/><\/p>\n<p><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\"><i><strong>Editor\u2019s note, Feb. 14, 2024 \u2013 <\/strong>The Project Freta analysis web portal is no longer publicly accessible. Please contact <\/i><a class=\"fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn\" title=\"mailto:project-freta@microsoft.com\" href=\"mailto:project-freta@microsoft.com\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link project-freta@microsoft.com\"><i>project-freta@microsoft.com<\/i><\/a><i>.<\/i><\/span><\/p>\n<blockquote>\n<h4><em>\u201cSunlight is said to be the best of disinfectants.\u201d<\/em><\/h4>\n<h4>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u2015Louis D. Brandeis, 1914<\/h4>\n<\/blockquote>\n<p>We often think about the field of computer security as a field of walls and barriers that keep intruders out. With Project Freta, we invite readers to think not of walls but of sunlight. When attackers build malware that cannot be detected, they gain enormous economic value. Undetected malware can be continuously re-used: it is never part of attack reporting, never summons incident responders, and never alerts the victim to a data theft event. The economics of reuse can justify enormous attacker investment in malware non-discoverability. Conversely, once a malware strain is discovered, its value plummets in tandem with its reusability. In this stealth economy, that which hides in darkness is removed with sunlight. The question for defenders, then, is how can we raise the cost of non-discovery? Is there a point beyond which a class of malware is no longer economically viable?<\/p>\n<table style=\"float: right; width: 50%; margin: 15px; text-align: center; border: 1px solid #000000; border-collapse: collapse; border-spacing: inherit;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"background-color: #000000; padding: inherit; border: inherit; height: 24px;\"><span style=\"color: #ffffff;\"><strong>Quick Start<\/strong><\/span><\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"padding: inherit; border: inherit; height: 23px;\"><strong>Project Freta:<\/strong> free service from Microsoft Research for detecting evidence of OS and sensor sabotage, such as rootkits and advanced malware, in memory snapshots of live Linux systems<\/td>\n<\/tr>\n<tr style=\"height: 46px;\">\n<td style=\"padding: inherit; border: inherit; height: 46px;\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/freta.microsoft.com\" target=\"_blank\" rel=\"noopener noreferrer\">Access Project Freta Portal<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n(connect with any AAD or Microsoft Account)<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"padding: inherit; border: inherit; height: 23px;\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/security\/research\/project-freta\">Documentation<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> | <a href=\"mailto:project-freta@microsoft.com\">Questions or Feedback?<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Incubated at Microsoft Research, Project Freta is a roadmap toward trusted sensing for the cloud that can allow enterprises to engage in regular, complete discovery sweeps for undetected malware. The project\u2019s namesake, Warsaw\u2019s Freta Street, was the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.bing.com\/maps?osid=207f4a10-cacf-477c-9a3b-f070a4008478&cp=52.251633~21.007387&lvl=18&imgid=8878a1c7-8a60-4ab7-adf3-394be45a9708&v=2&sV=2&form=S00027\">birthplace<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> of Marie Curie, a pioneer of <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.smithsonianmag.com\/history\/how-marie-curie-brought-x-ray-machines-to-battlefield-180965240\/\">battlefield imaging<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. While snapshot-based memory forensics is a field now in its second decade, no commercial cloud has yet provided customers the ability to perform full memory audits of thousands of virtual machines (VMs) without intrusive capture mechanisms and <em>a priori<\/em> forensic readiness. Just as yesteryear\u2019s film cameras and today\u2019s smartphones have similar megapixels but vastly different ease of use and availability, Project Freta intends to <em>automate<\/em> and <em>democratize<\/em> VM forensics to a point where every user and every enterprise can sweep volatile memory for unknown malware with the push of a button\u2014no setup required.<\/p>\n<p>The goal of this democratization effort is to increase the development cost of undiscoverable cloud malware toward its theoretical maximum. What would happen if a commercial cloud could <em>guarantee<\/em> the capture of malware, no matter how expensive or exotic, in volatile memory? Producers of stealthy malware would then be locked into an expensive cycle of complete re-invention, rendering such a cloud an unsuitable place for cyberattacks. This is the future we wish to realize.<\/p>\n<p>To this end, we propose four properties of trusted sensing to maximize malware discovery and present our technical work along this roadmap to date. As a technology demonstration, Project Freta is opening public access to an analysis portal capable of automatically fingerprinting and auditing a memory snapshot of most cloud-based Linux VMs; over 4,000 kernel versions are supported automatically. Hyper-V checkpoint files captured from a modern enterprise can be searched for everything from cryptominers to advanced kernel rootkits. This prototype previews an exciting future option for cloud consumers: transitioning from boutique forensic consulting services to automated malware discovery built into the bedrock of a commercial cloud.<\/p>\n<h3>Unbiased data from armored sensors<\/h3>\n<p>In computer security we strive to be evidence-driven. Unfortunately, using reports of cyberattacks to guide defensive approaches is subject to a well-known yet powerful <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Survivorship_bias\">survivor bias<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> that can distort the importance of data and lead us astray.<\/p>\n<p>Abraham Wald\u2019s work during WWII provided a <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.ams.org\/publicoutreach\/feature-column\/fc-2016-06\">famously repeated<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> example of survivor bias in a dataset: reports of bullet holes in airplanes. Rather than recommend armor where bullet holes were reported, Wald recommended armor only in areas where there were no reports of bullet holes. This was due to a critical insight about the nature of bullet hole reporting: <em>bullet holes were only counted when an airplane arrived home.<\/em> Successful attacks removed the attack from the dataset, hence successful attacks could be described only by their absence from the dataset. No reports of bullet attacks on the engines? <em>Armor the engines.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-671109\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Freta-fig-1-_plane-300x229.jpg\" alt=\"outline of airplane from top-down perspective with red dots on it\" width=\"437\" height=\"333\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Freta-fig-1-_plane-300x229.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Freta-fig-1-_plane-80x60.jpg 80w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Freta-fig-1-_plane.jpg 603w\" sizes=\"auto, (max-width: 437px) 100vw, 437px\" \/><\/p>\n<p>Today\u2019s computer security sensors suffer from this same bias. When attackers obtain a model of our sensors and design a way to evade these sensors, we receive no reports of cyberattacks. It is tempting to look at areas in which we receive few or no attack reports and think: <em>\u201cI\u2019ve received no reports of successful attacks on my attack reporting capability!\u201d<\/em> This statement is not as reassuring as it sounds. While we are flooded with billions of reports of malware a year, it is important to understand that synthesizing or mutating existing malware is a <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/system\/files\/conference\/woot12\/woot12-final19.pdf\">nearly cost-free exercise<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<p>Meanwhile, attackers that manage to strike directly at a security sensor, security agent, or privileged operating system component can disable one step in the attack reporting pipeline and vanish without a trace, leaving only an absence in our attack reporting. The lowest-resourced attackers dominate our datasets; the highly resourced live outside our datasets forever. <em>We must invert this data.<\/em><\/p>\n<p>Project Freta was designed and built with survivor bias at its core. It is a security project designed from first principles to drive the cost of sensor evasion as high as possible and in many cases render evasion technically infeasible. To achieve this, in July of 2018 we started with a clean slate.<\/p>\n<h3>A Greenfield Mandate<\/h3>\n<p>The fact that sensor evasion is possible at all is surprising to many outsiders to the field of computer security. Anyone who\u2019s visited a retail store understands that it\u2019s a good idea to put the security cameras out of reach\u2014why haven\u2019t we done something similar in the cloud? The answer is a familiar one:<em> backwards compatibility<\/em>. Our first networked computers didn\u2019t have the silicon real estate to devote to an isolated security sensor. Opportunities for technology companies to break backwards compatibility and \u201cgreenfield\u201d redesign with security in mind have appeared only periodically, seen primarily in the mobile and console industries. These redesigns have allowed for increasing hardware separation between the compute plane and the security plane, a detailed topic for platform security journals beyond the scope of this blog post. In today\u2019s cloud, this separation between compute and security planes usually occurs at the hypervisor; tenant workloads are separated from provider workloads via the hypervisor barrier. Is the hypervisor barrier strong enough to prevent sensor evasion? <em>Maybe not.<\/em><\/p>\n<p>Recently, microarchitectural flaws and forensics research have called some of the properties of the hypervisor barrier into question. A recent forensics research paper, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/dfrws.org\/sites\/default\/files\/session-files\/paper_who_watches_the_watcher_detecting_hypervisor_introspection_from_unprivileged_guests.pdf\">\u201cWho Watches The Watcher? Detecting Hypervisor Introspection from Unprivileged Guests\u201d<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> presented at DFRWS in 2018, articulated a method that attackers resident in the compute plane could employ to detect when they are being observed from the security plane\u2014piercing the hypervisor barrier and allowing for pre-emptive self-destruct in order to avoid discovery. This paper came complete with an open-source implementation of the technique. This meant that even <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/suif.stanford.edu\/papers\/vmi-ndss03.pdf\">Virtual Machine Introspection<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (VMI) endpoint sensors could be evaded with existing open-source software.<\/p>\n<p>Implementing and democratizing trusted sensing for the cloud meant first articulating the properties of a system that would be immune to these types of attacks:<\/p>\n<table style=\"border-collapse: collapse; padding: 10px; width: 100%; border-spacing: inherit;\" border=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 100%; padding: 10px; border: 1px solid; text-align: center;\"><strong>Project Freta\u2019s four properties of trusted sensing<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%; padding: 10px; border: 1px solid;\">\n<p><strong>1. Detect. <\/strong>No program can:<\/p>\n<p><em>Detect the presence of a sensor prior to installing itself<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%; padding: 10px; border: 1px solid;\">\n<p><strong>2. Hide. <\/strong>No program can:<\/p>\n<p><em>Reside in an area out of view of the sensor<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%; padding: 10px; border: 1px solid;\">\n<p><strong>3. Burn. <\/strong>No program can:<\/p>\n<p><em>Detect operation of the sensor and erase or modify itself prior to acquisition<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%; padding: 10px; border: 1px solid;\">\n<p><strong>4. Sabotage. <\/strong>No program can:<\/p>\n<p><em>Modify the sensor in a way that can prevent the program\u2019s acquisition<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>To achieve these properties and end the stealthy-malware arms race, incrementally improving existing endpoint technology is insufficient. When attackers and defenders share a microarchitecture, every detection move a defender makes disturbs the environment in a way that is eventually discoverable by an attacker invested in secrecy. The only way to discover such attackers is to remove their insight into defense. This left the question: how much engineering was required to fully automate memory forensics, operate at efficiencies that enabled cloud-scale processing, and still retain the element of surprise?<\/p>\n<h3>Building Project Freta<\/h3>\n<p>A brief technology evaluation taught the team that starting from scratch was the only viable approach. To leave no place to <strong>hide<\/strong>, we needed to accept the huge data footprint imposed by whole-system memory analysis. To address <strong>detection<\/strong> and <strong>burn<\/strong>, such as \u201c<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/system\/files\/conference\/woot14\/woot14-ho.pdf\">red pill attacks<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>,\u201d we needed two components: 1) an offline analysis system that could operate in batch mode and 2) a sensor that could provide whole-system memory captures without executing a single clarifying instruction on the guest. Finally, to mitigate <strong>sabotage<\/strong> we needed to ensure our system was built from the ground up to be memory safe.<\/p>\n<p>For Project Freta, many of these challenges compounded to make \u201cinstant forensics for everyone\u201d a daunting task:<\/p>\n<ul>\n<li><strong>Untouchable Images:<\/strong> Many existing forensic approaches execute clarifying instructions on the guest, such as copying KASLR keys. Unfortunately, these instructions can tip off malware to a capture event. The requirement not to interact with the target OS, needed to ensure the element of surprise, mandated a forensic imaging technology that was completely \u201cblind.\u201d As a consequence, memory scrambled by security mechanisms such as ASLR needed to be decoded without keys or context. This task is complex enough for one operating system, and it\u2019s a templating nightmare to support <em>any<\/em> operating system. Project Freta now supports over 4,000 Linux kernels.<\/li>\n<li><strong>Universal OS Support: <\/strong>The long-standing forensics requirement that information about the operating system be arrived at <em>a priori<\/em> needed to be removed. This meant quickly fingerprinting any operating system in the cloud given only a scrambled memory image. We knew from the beginning that, given private symbols, this could be achieved for Windows in a believable way. So, we chose Linux instead, knowing that the large number of publicly available kernels for Linux would make this problem significantly more difficult. It also meant that a functional result would pay down the technology debt required to build faith in the approach. With Linux behind us, Windows support is on our roadmap.<\/li>\n<li><strong>Cloud Scale: <\/strong>Automated capture and analysis won\u2019t matter to customers if a day of cloud compute is needed to perform a single audit. To operate on modern cloud enterprises, we knew that the ability to programmatically audit 100,000 machines in a short, cost-bounded timeframe was a minimum requirement. This meant architecting from the beginning for batch processing in the cloud, including OS fingerprinting in the performance requirements, and thinking ahead about edge cases such as high-performance-compute VMs with 100+ gigabytes of RAM.<\/li>\n<li><strong>Memory Safety:<\/strong> We knew that any system designed to hunt for tools fielded by the most well-resourced attackers would itself become a target. Given the history and preponderance of memory-corruption exploits, we made the choice as a team to embrace Rust at the beginning, architecting the entire capability from scratch in Rust from line one and building upon no existing software. This has yielded a high-performance analysis engine for memory images of arbitrary size that <em>also<\/em> has memory safety properties built in.<\/li>\n<\/ul>\n<h3>Project Freta: This release<\/h3>\n<p>The Project Freta analysis engine consumes snapshots of whole-system Linux volatile memory and extracts an enumeration of system objects. Some kernel hooking identification is performed automatically; this can be used by analysts to detect novel rootkits. The analysis portal is available in prototype form for public use: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/freta.microsoft.com\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/freta.microsoft.com<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<p>The prototype portal supports many types of memory snapshots as inputs. Currently, only a Hyper-V checkpoint has been evaluated to provide a reasonable approximation of the \u201celement of surprise\u201d necessary to achieve trusted sensing:<\/p>\n<ul>\n<li>Use the Hyper-V checkpoint feature to produce a VMRS file<\/li>\n<li>Convert a VMWare snapshot to produce a CORE file<\/li>\n<li>Extract memory from within a running system using AVML<\/li>\n<li>Extract memory from within a running system using LiME<\/li>\n<\/ul>\n<p>Once the snapshot is uploaded to the portal and analyzed, the report data is made available via the portal and both REST and Python APIs. Project Freta\u2019s initial release supports API-driven automated use.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-671844 size-full\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Freta_Rootkits_Figure_UpdatedV.jpg\" alt=\"Potential Rootkits report\" width=\"927\" height=\"531\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Freta_Rootkits_Figure_UpdatedV.jpg 927w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Freta_Rootkits_Figure_UpdatedV-300x172.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Freta_Rootkits_Figure_UpdatedV-768x440.jpg 768w\" sizes=\"auto, (max-width: 927px) 100vw, 927px\" \/><\/p>\n<p>The report contains an enumeration of system objects over the interval during which the sample was taken:<\/p>\n<ul>\n<li>Global values and addresses<\/li>\n<li>Debugged processes<\/li>\n<li>In-memory files<\/li>\n<li>Kernel interrupt table<\/li>\n<li>Kernel modules<\/li>\n<li>Kernel syscall table<\/li>\n<li>Networks<\/li>\n<li>Open files<\/li>\n<li>ARP table (arp)<\/li>\n<li>Open sockets<\/li>\n<li>Processes<\/li>\n<li>Unix sockets (lsof)<\/li>\n<\/ul>\n<p>Of interest to defenders: debugging relationships are provided to allow for investigation of counter-debugging techniques; library imports are listed to allow for investigation of LD_PRELOAD based attacks; and simple hooking of systems calls is detected and mapped.<\/p>\n<p>For further info, please visit our <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/docs.microsoft.com\/security\/research\/project-freta\">documentation<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<h3>Project Freta: Futures<\/h3>\n<p>Project Freta\u2019s second component for achieving trusted sensing is a sensor built for Azure that allows operators to migrate the volatile memory of live virtual machines to an offline analysis environment without disrupting execution. Completed in the winter of 2019, this sensor capability is currently only available to Microsoft researchers and is not fielded to any of our commercial clouds\u2014executive briefings and demos are available. This sensor, coupled with the Freta analysis environment, demonstrates a path to cheap, automated memory forensic audits of large enterprises (10,000+ VMs).<\/p>\n<p>A great deal of development lies ahead for Project Freta: adding support for Windows, extending our automated program analysis capabilities, and experimenting with AI-based decision-making for novel threat detection. For now, we are opening access to the analysis portal for customer use and experimentation. We hope that Project Freta empowers administrators and responders and is used globally as it has been used at Microsoft: to hunt advanced intruders and their toolkits. We welcome your feedback at <a href=\"mailto:project-freta@microsoft.com\">project-freta@microsoft.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Editor\u2019s note, Feb. 14, 2024 \u2013 The Project Freta analysis web portal is no longer publicly accessible. Please contact project-freta@microsoft.com. \u201cSunlight is said to be the best of disinfectants.\u201d \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u2015Louis D. Brandeis, 1914 We often think about the field of computer [&hellip;]<\/p>\n","protected":false},"author":38838,"featured_media":671769,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[{"type":"user_nicename","value":"Mike Walker","user_id":"39150"}],"msr_hide_image_in_river":0,"footnotes":""},"categories":[1],"tags":[],"research-area":[13558],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-670932","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-blog","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[682881,901101],"related-projects":[680595],"related-events":[],"related-researchers":[{"type":"user_nicename","value":"Mike Walker","user_id":39150,"display_name":"Mike Walker","author_link":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/walkerm\/\" aria-label=\"Visit the profile page for Mike Walker\">Mike Walker<\/a>","is_active":false,"last_first":"Walker, Mike","people_section":0,"alias":"walkerm"}],"msr_type":"Post","featured_image_thumbnail":"<img width=\"960\" height=\"540\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-960x540.png\" class=\"img-object-cover\" alt=\"Project Freta graphic\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-960x540.png 960w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-300x169.png 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1024x576.png 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-768x432.png 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1536x865.png 1536w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-2048x1153.png 2048w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1066x600.png 1066w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-655x368.png 655w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-343x193.png 343w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-640x360.png 640w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1280x720.png 1280w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/1400x788_Freta_NoLogo-2-1920x1080.png 1920w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>","byline":"<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/walkerm\/\" title=\"Go to researcher profile for Mike Walker\" aria-label=\"Go to researcher profile for Mike Walker\" data-bi-type=\"byline author\" data-bi-cN=\"Mike Walker\">Mike Walker<\/a>","formattedDate":"July 6, 2020","formattedExcerpt":"Editor\u2019s note, Feb. 14, 2024 \u2013 The Project Freta analysis web portal is no longer publicly accessible. Please contact project-freta@microsoft.com. \u201cSunlight is said to be the best of disinfectants.\u201d \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u2015Louis D.&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/670932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/users\/38838"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/comments?post=670932"}],"version-history":[{"count":80,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/670932\/revisions"}],"predecessor-version":[{"id":1007916,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/670932\/revisions\/1007916"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/671769"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=670932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/categories?post=670932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/tags?post=670932"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=670932"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=670932"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=670932"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=670932"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=670932"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=670932"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=670932"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=670932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}