Reuse-Oriented Camouflaging Trojan: Vulnerability Detection and Attack Construction

被引:1
|
作者
Lin, Zhiqiang [1 ]
Zhang, Xiangyu [1 ]
Xu, Dongyan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/DSN.2010.5544305
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce the reuse-oriented camouflaging trojan - a new threat to legitimate software binaries. To perform a malicious action, such a trojan identifies and reuses an existing function in a legal binary program instead of implementing the function itself. Furthermore, this trojan is stealthy in that the malicious invocation of a targeted function usually takes place in a location where it is legal to do so, closely mimicking a legal invocation. At the network level, the victim binary can still follow its communication protocol without exhibiting any anomalous behavior. Meanwhile, many close-source shareware binaries are rich in functions that can be maliciously "reused", making them attractive targets of this type of attack. In this paper, we present a framework to determine if a given binary program is vulnerable to this attack and to construct a concrete trojan if so. Our experiments with a number of real-world software binaries demonstrate that the reuse-oriented camouflaging trojans are a real threat and vulnerabilities of this type in legal binaries can be effectively revealed and confirmed.
引用
收藏
页码:281 / 290
页数:10
相关论文
共 50 条
  • [1] Reuse-oriented design of embedded systems
    Monjau, D
    Sporer, M
    [J]. KES'2000: FOURTH INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED INTELLIGENT ENGINEERING SYSTEMS & ALLIED TECHNOLOGIES, VOLS 1 AND 2, PROCEEDINGS, 2000, : 691 - 694
  • [2] Reuse-oriented design of embedded systems
    Monjau, Dieter
    Sporer, Mathias
    [J]. International Conference on Knowledge-Based Intelligent Electronic Systems, Proceedings, KES, 2000, 2 : 691 - 694
  • [3] A reuse-oriented workflow definition language
    Blin, MJ
    Wainer, J
    Medeiros, CB
    [J]. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2003, 12 (01) : 1 - 36
  • [4] A reuse-oriented framework for hierarchical specifications
    Coudert, S
    Le Gall, P
    [J]. ALGEBRAIC METHODOLOGY AND SOFTWARE TECHNOLOGY, PROCEEDINGS, 2000, 1816 : 438 - 453
  • [5] A Reuse-Oriented Auxiliary Construction Method for Software Fault Tree and Tool Implementation
    Li, Luyi
    Lu, Minyan
    Gu, Tingyang
    [J]. PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 451 - 456
  • [6] Reuse-oriented process component representation and retrieval
    Xu, RZ
    He, T
    Chu, DS
    Xue, YJ
    Qian, LQ
    [J]. Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 911 - 915
  • [7] Analogical retrieval in reuse-oriented requirements engineering
    Maiden, NAM
    Sutcliffe, AG
    [J]. SOFTWARE ENGINEERING JOURNAL, 1996, 11 (05): : 281 - 292
  • [8] Analogical retrieval in reuse-oriented requirements engineering
    Centre for Human-Computer Interface Design, City University, Northampton Square, London ECIV, United Kingdom
    [J]. Software Eng J, 5 (281-292):
  • [9] Reuse-Oriented Test Case Management Framework
    Zhang, Wenning
    Zhao, Dong
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 512 - 515
  • [10] An analysis of errors in a reuse-oriented development environment
    Thomas, WM
    Delis, A
    Basili, VR
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 1997, 38 (03) : 211 - 224