Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains

被引:0
|
作者
Barr-Smith, Frederick [1 ]
Blazytko, Tim [2 ]
Baker, Richard [1 ]
Martinovic, Ivan [1 ]
机构
[1] Univ Oxford, Oxford, England
[2] Emproof BV, Eindhoven, Netherlands
基金
英国工程与自然科学研究理事会;
关键词
Supply Chain Security; Differential Analysis; Binary Analysis; Malware; Code Signing; Obfuscation; Advanced Persistent Threat;
D O I
10.1145/3560835.3564550
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The insertion of trojanised binaries into supply chains are a particularly subtle form of cyber-attack that require a multi-staged and complex deployment methodology to implement and execute. In the years preceding this research there has been a spike in closed-source software supply chain attacks used to attack downstream clients or users of a company. To detect this attack type, we present an approach to detecting the insertion of malicious functionality in supply chains via differential analysis of binaries. This approach determines whether malicious functionality has been inserted in a particular build by looking for indicators of maliciousness. We accomplish this via automated comparison of a known benign build to successive potentially malicious versions. To substantiate this approach we present a system, Exorcist, that we have designed, developed and evaluated as capable of detecting trojanised binaries in Windows software supply chains. In evaluating this system we analyse 12 samples from high-profile APT attacks conducted via the software supply chain.
引用
收藏
页码:51 / 61
页数:11
相关论文
共 50 条
  • [1] Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains
    Barr-Smith, Frederick
    Blazytko, Tim
    Baker, Richard
    Martinovic, Ivan
    [J]. SCORED 2022 - Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, co-located with CCS 2022, 2022, : 51 - 61
  • [2] Features of the Licensing of Open-Source and Closed-Source Software
    Pivneva, Svetlana, V
    Vitkovskaya, Nataliaya G.
    Katys, Petr
    Goncharov, Vitaly V.
    Livson, Maya
    [J]. REVISTA GEINTEC-GESTAO INOVACAO E TECNOLOGIAS, 2021, 11 (02): : 1211 - 1221
  • [3] An empirical study of open-source and closed-source software products
    Paulson, JW
    Succi, G
    Eberlein, A
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2004, 30 (04) : 246 - 256
  • [4] Testing the theory of relative defect proneness for closed-source software
    Koru, Gunes
    Liu, Hongfang
    Zhang, Dongsong
    El Emam, Khaled
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2010, 15 (06) : 577 - 598
  • [5] Testing the theory of relative defect proneness for closed-source software
    Gunes Koru
    Hongfang Liu
    Dongsong Zhang
    Khaled El Emam
    [J]. Empirical Software Engineering, 2010, 15 : 577 - 598
  • [6] Vulnerability Discovery in Open- and Closed-Source Software: A New Paradigm
    Sharma, Ruchi
    Singh, R. K.
    [J]. SOFTWARE ENGINEERING (CSI 2015), 2019, 731 : 533 - 539
  • [7] SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers
    Chen, Weiteng
    Wang, Yu
    Zhang, Zheng
    Qian, Zhiyun
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 749 - 763
  • [8] Constructing Supply Chains in Open Source Software
    Ma, Yuxing
    [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 458 - 459
  • [9] Survey on Open Source Software Supply Chains
    Gao, Kai
    He, Hao
    Xie, Bing
    Zhou, Ming-Hui
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (02): : 581 - 603
  • [10] Insights from Open Source Software Supply Chains
    Mockus, Audris
    [J]. ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 3 - 3