/MiniVisorPkg

The research UEFI hypervisor that supports booting an operating system.

Primary LanguageCMIT LicenseMIT

MiniVisor

Codacy Badge

This is a research hypervisor written as a UEFI and Windows driver for the educational purpose for Intel processors.

This MiniVisor, as a UEFI driver, provides the ability to inspect system activities even before the operating system boots, while as a Windows driver, allows developers to debug it with familiar tools like WinDbg.

Showcase

  • Loading the hypervisor from the UEFI shell. Readme_Showcase1.jpg

  • Logging boot activities and interacting with the guest. Readme_Showcase2.jpg

  • Booting Ubuntu on a bare-metal. Readme_Showcase3.jpg

Motivation

The goal of this project is to share an additional learning resource for writing UEFI hypervisors with the community and researchers.

There are numerous open source hypervisors with small and easy-to-study implementations, but those that support booting operating systems as UEFI drivers are still not many.

Given the universality of UEFI systems on the AMD64 ecosystem and the unique ability to monitor, attack and protect the system throughout operating system startup on bare-metal systems, the authors believe that having the understanding and being able to develop this type of hypervisors are valuable for research.

System Requirements

Common Requirements:

  • Intel VT-x and EPT supported processors

Requirements for the UEFI driver:

  • UEFI-based system
  • 64bit Windows 10, IoT Core, or Ubuntu to boot

Requirements for the Windows driver:

  • 64bit Windows 7 and 10

See Building and Debugging for testing.

Advantages and Use Cases

While this project does not implement or designed for any immediately useful features, UEFI-based hypervisors have multiple advantages over Windows driver-based ones and can implement unique features.

  • No need of disabling Hyper-V (Virtualization Based Security) to run the custom hypervisor
  • No need of enabling the test-signing mode
  • Zero direct indicator of existence of the hypervisor from operating system perspective
  • Detecting bootkit and early system modification
  • Implementing operating system agnostic solutions
  • Installing hooks during the early boot phase and letting PatchGuard to protect them Readme_Showcase4.jpg

Acknowledgments

The authors thank for creators and maintainers of the following projects:

  • Bareflank and STM -- for publishing UEFI-base hypervisors with the relatively small codebase.
  • zpp_hypervisor -- for making me realize that writing UEFI-based hypervisors is viable.
  • EfiGuard -- for clean codebase and rich documentation for UEFI development newbies.
  • hvpp -- for few techniques required for the UEFI environment.
  • ia32-doc -- for saving me from defining thousands of constants and structures by hand.