Capturing Malware Propagations with Code Injections and Code-Reuse Attacks

被引:26
|
作者
Korczynski, David [1 ,2 ]
Yin, Heng [2 ]
机构
[1] Univ Oxford, Oxford, England
[2] Univ Calif Riverside, Riverside, CA 92521 USA
基金
美国国家科学基金会;
关键词
Malware; Taint Analysis; Security; Code Injection;
D O I
10.1145/3133956.3134099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Defending against malware involves analysing large amounts of suspicious samples. To deal with such quantities we rely heavily on automatic approaches to determine whether a sample is malicious or not. Unfortunately, complete and precise automatic analysis of malware is far from an easy task. This is because malware is often designed to contain several techniques and countermeasures specifically to hinder analysis. One of these techniques is for the malware to propagate through the operating system so as to execute in the context of benign processes. The malware does this by writing memory to a given process and then proceeds to have this memory execute. In some cases these propagations are trivial to capture because they rely on well-known techniques. However, in the cases where malware deploys novel code injection techniques, rely on code-reuse attacks and potentially deploy dynamically generated code, the problem of capturing a complete and precise view of the malware execution is non-trivial. In this paper we present a unified approach to tracing malware propagations inside the host in the context of code injections and code-reuse attacks. We also present, to the knowledge of the authors, the first approach to identifying dynamically generated code based on information-flow analysis. We implement our techniques in a system called Tartarus and match Tartarus with both synthetic applications and real-world malware. We compare Tartarus to previous works and show that our techniques substantially improve the precision for collecting malware execution traces, and that our approach can capture intrinsic characteristics of novel code injection techniques.
引用
收藏
页码:1691 / 1708
页数:18
相关论文
共 50 条
  • [11] Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains
    Schloegel, Moritz
    Blazytko, Tim
    Basler, Julius
    Hemmer, Fabian
    Holz, Thorsten
    COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 218 - 239
  • [12] Thwarting code-reuse and side-channel attacks in embedded systems
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panagiotis
    COMPUTERS & SECURITY, 2023, 133
  • [13] A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level
    van der Veen, Victor
    Goktas, Enes
    Contag, Moritz
    Pawlowski, Andre
    Chen, Xi
    Rawat, Sanjay
    Bos, Herbert
    Holz, Thorsten
    Athanasopoulos, Elias
    Giuffrida, Cristiano
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 934 - 953
  • [14] MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks
    Salehi, Majid
    Hughes, Danny
    Crispo, Bruno
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 33 - 40
  • [15] The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX
    Biondo, Andrea
    Conti, Mauro
    Davi, Lucas
    Frassetto, Tommaso
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1213 - 1227
  • [16] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024,
  • [17] A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors
    Oh, Hyunyoung
    Cho, Yeongpil
    Paek, Yunheung
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (07): : 7287 - 7314
  • [18] A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors
    Hyunyoung Oh
    Yeongpil Cho
    Yunheung Paek
    The Journal of Supercomputing, 2021, 77 : 7287 - 7314
  • [19] Survey of Methods for Automated Code-Reuse Exploit Generation
    A. V. Vishnyakov
    A. R. Nurmukhametov
    Programming and Computer Software, 2021, 47 : 271 - 297
  • [20] CommonCode: A Code-Reuse Platform for Wireless Network Experimentation
    Lee, Junhee
    Lee, Jinsung
    Lee, Kyunghan
    Chong, Song
    IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (03) : 156 - 163