Ghost Patches: Fake Patches for Fake Vulnerabilities

被引:4
|
作者
Avery, Jeffrey [1 ]
Spafford, Eugene H.
机构
[1] Purdue Univ, Comp Sci Dept, 305 N Univ St, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-319-58469-0_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Offensive and defensive players in the cyber security sphere constantly react to either party's actions. This reactive approach works well for attackers but can be devastating for defenders. This approach also models the software security patching lifecycle. Patches fix security flaws, but when deployed, can be used to develop malicious exploits. To make exploit generation using patches more resource intensive, we propose inserting deception into software security patches. These ghost patches mislead attackers with deception and fix legitimate flaws in code. An adversary using ghost patches to develop exploits will be forced to use additional resources. We implement a proof of concept for ghost patches and evaluate their impact on program analysis and runtime. We find that these patches have a statistically significant impact on dynamic analysis runtime, increasing time to analyze by a factor of up to 14x, but do not have a statistically significant impact on program runtime.
引用
收藏
页码:399 / 412
页数:14
相关论文
共 50 条
  • [1] 'FAKE GHOST'
    HAOGEZI
    [J]. CHINESE LITERATURE, 1992, : 154 - 156
  • [2] Vulnerabilities of fingerprint reader to fake fingerprints attacks
    Espinoza, Marcela
    Champod, Christophe
    Margot, Pierre
    [J]. FORENSIC SCIENCE INTERNATIONAL, 2011, 204 (1-3) : 41 - 49
  • [3] Tracking Patches for Open Source Software Vulnerabilities
    Xu, Congying
    Chen, Bihuan
    Lu, Chenhao
    Huang, Kaifeng
    Peng, Xin
    Liu, Yang
    [J]. PROCEEDINGS OF THE 30TH ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2022, 2022, : 860 - 871
  • [4] Vulnerabilities and Security Patches Detection in OSS: A Survey
    Lin, Ruyan
    Fu, Yulong
    Yi, Wei
    Yang, Jincheng
    Cao, Jin
    Dong, Zhiqiang
    Xie, Fei
    Li, Hui
    [J]. ACM Computing Surveys, 2024, 57 (01)
  • [5] Discovering Vulnerabilities and Patches for Open Source Security
    Gunkel, Tamara
    Hupperich, Thomas
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2022, : 641 - 648
  • [6] Approach of Leveraging Patches to Discover Unknown Vulnerabilities
    Li Z.
    Bian P.
    Shi W.-C.
    Liang B.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2018, 29 (05): : 1199 - 1212
  • [7] 'Fake/not fake'
    Kok, JPF
    [J]. BURLINGTON MAGAZINE, 2005, 147 (1225): : 271 - 273
  • [8] WHEN IS A FAKE NOT A FAKE?
    不详
    [J]. STRAD, 2010, 121 (1448): : 67 - 67
  • [9] But Fake is Still Fake
    Zegart, Amy B.
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2011, 24 (02) : 421 - +
  • [10] "Fake Tan" or "Fake News"?
    Meyer, Georg
    Amano, Kinjiro
    Xiao, Kaida
    Wuerger, Sophie
    [J]. I-PERCEPTION, 2020, 11 (02):