Microsoft Brings Kernel Data Protection to Windows 10

A new Microsoft blog post explains how the firm is now using virtualization-based security (VBS) to prevent data corruption attacks in Windows 10.

“Attackers, confronted by security technologies that prevent memory corruption, like Code Integrity (CI) and Control Flow Guard (CFG), are expectedly shifting their techniques towards data corruption,” Microsoft’s Base Kernel Team explains. “Attackers use data corruption techniques to target system security policy, escalate privileges, tamper with security attestation, modify ‘initialize once’ data structures, among others.”

Windows Intelligence In Your Inbox

Sign up for our new free newsletter to get three time-saving tips each Friday — and get free copies of Paul Thurrott's Windows 11 and Windows 10 Field Guides (normally $9.99) as a special welcome gift!

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

To help prevent this kind of attack, Microsoft has added Kernel Data Protection (KDP) to Windows 10. Described as “a new technology that prevents data corruption attacks by protecting parts of the Windows kernel and drivers through virtualization-based security (VBS),” KDP is a set of APIs that provide the ability to mark some kernel memory as read-only, preventing attackers from ever modifying its contents.

“For example, we’ve seen attackers use signed but vulnerable drivers to attack policy data structures and install a malicious, unsigned driver,” the firm says. “KDP mitigates such attacks by ensuring that policy data structures cannot be tampered with.”

KDP also provides performance and reliability improvements, and Microsoft says that it gives driver developers and vendors an incentive to improve compatibility with virtualization-based security, which should drive adoption of these technologies.

If you’re interested in this work, check out the original post: It’s a really detailed dive into the changes Microsoft has made to security in Windows 10.

Tagged with

Share post

Please check our Community Guidelines before commenting

Conversation 11 comments

  • rosyna

    09 July, 2020 - 1:17 pm

    <p>Sadly, software developers have to explicitly opt into these new KPIs. That’ll harm uptake for years.</p>

    • paradyne

      09 July, 2020 - 1:55 pm

      <blockquote><em><a href="#553092">In reply to rosyna:</a></em></blockquote><p>Only driver developers, this isn't for regular apps to use.</p><p><br></p><p>Expect server vendors, and PC suppliers like Surface, Dell, HP etc. to ensure that drivers they ship with their systems are updated to make use of this, plus all the standard drivers included with Windows.</p>

      • rosyna

        10 July, 2020 - 9:46 pm

        <blockquote><em><a href="#553102">In reply to paradyne:</a></em></blockquote><p>Yes, “KPIs” means “kernel programming interfaces”…</p><p><br></p><p>We also know for a fact OEMs don’t always adopt new security features In a timely manner (if at all). I mean, just look at how Dell didn’t enable/implement some DMA protections that have been there for years and would have significantly mitigated the recent physical Thunderbolt controller attack.</p>

  • beckoningeagle

    Premium Member
    09 July, 2020 - 1:23 pm

    <p>Are these changes in the 2004 build or the newer insider builds?</p><p><br></p>

    • martinusv2

      Premium Member
      09 July, 2020 - 2:16 pm

      <blockquote><em><a href="#553094">In reply to BeckoningEagle:</a></em></blockquote><p>I am wondering the same. Is that something you know Paul?</p>

    • Paul Thurrott

      Premium Member
      10 July, 2020 - 8:34 am

      <blockquote><a href="#553094"><em>In reply to BeckoningEagle:</em></a></blockquote><p>I mean, you can tackle the 10,000 word Microsoft post to find out, but I didn't see any reference to that. :)</p>

      • beckoningeagle

        Premium Member
        10 July, 2020 - 10:33 am

        <blockquote><em><a href="#553238">In reply to paul-thurrott:</a></em></blockquote><p>Burn!!! </p><p><br></p><p>But I did tackle it before posting </p>

        • Paul Thurrott

          Premium Member
          10 July, 2020 - 10:50 am

          🙂 Sorry, was joking. The Microsoft headline says it is “new.”

          • beckoningeagle

            Premium Member
            10 July, 2020 - 8:35 pm

            <blockquote><em><a href="#553255">In reply to paul-thurrott:</a></em></blockquote><p>But if I go by the headline I don't need to tackle the whole 10,000 words, just read the headline.</p><p><br></p><p>Counter-burn!!!!! ha ha ha</p><p><br></p>

            • Paul Thurrott

              Premium Member
              11 July, 2020 - 9:30 am

              Sorry, I’ve lost track of what we’re even talking about here. 🙂

  • Paul Tarnowski

    09 July, 2020 - 4:18 pm

    <p>If you follow the links, you'll find out that requirements for implementation have been on the Microsoft site since 2017.</p>

Windows Intelligence In Your Inbox

Sign up for our new free newsletter to get three time-saving tips each Friday

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Thurrott © 2024 Thurrott LLC