Capturing Malware Propagations with Code Injections and Code-Reuse Attacks

被引:26
|
作者
Korczynski, David [1 ,2 ]
Yin, Heng [2 ]
机构
[1] Univ Oxford, Oxford, England
[2] Univ Calif Riverside, Riverside, CA 92521 USA
基金
美国国家科学基金会;
关键词
Malware; Taint Analysis; Security; Code Injection;
D O I
10.1145/3133956.3134099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Defending against malware involves analysing large amounts of suspicious samples. To deal with such quantities we rely heavily on automatic approaches to determine whether a sample is malicious or not. Unfortunately, complete and precise automatic analysis of malware is far from an easy task. This is because malware is often designed to contain several techniques and countermeasures specifically to hinder analysis. One of these techniques is for the malware to propagate through the operating system so as to execute in the context of benign processes. The malware does this by writing memory to a given process and then proceeds to have this memory execute. In some cases these propagations are trivial to capture because they rely on well-known techniques. However, in the cases where malware deploys novel code injection techniques, rely on code-reuse attacks and potentially deploy dynamically generated code, the problem of capturing a complete and precise view of the malware execution is non-trivial. In this paper we present a unified approach to tracing malware propagations inside the host in the context of code injections and code-reuse attacks. We also present, to the knowledge of the authors, the first approach to identifying dynamically generated code based on information-flow analysis. We implement our techniques in a system called Tartarus and match Tartarus with both synthetic applications and real-world malware. We compare Tartarus to previous works and show that our techniques substantially improve the precision for collecting malware execution traces, and that our approach can capture intrinsic characteristics of novel code injection techniques.
引用
收藏
页码:1691 / 1708
页数:18
相关论文
共 50 条
  • [31] BBB-CFI: Lightweight CFI Approach Against Code-Reuse Attacks Using Basic Block Information
    He, Wenjian
    Das, Sanjeev
    Zhang, Wei
    Liu, Yang
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020, 19 (01)
  • [32] SGXDump: A Repeatable Code-Reuse Attack for Extracting SGX Enclave Memory
    Yoon, HanJae
    Lee, ManHee
    APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [33] An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation
    Zhang, Naiqian
    Feng, Zheyun
    Xu, Dongpeng
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 217 - 240
  • [34] Horus: An Effective and Reliable Framework for Code-Reuse Exploits Detection in Data Stream
    Yang, Gang
    Liu, Xingtong
    Tang, Chaojing
    ELECTRONICS, 2022, 11 (20)
  • [35] Detecting Code Reuse Attacks with Branch Prediction
    Lee, Yongsuk
    Lee, Gyungho
    COMPUTER, 2018, 51 (04) : 40 - 47
  • [36] Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation
    Wang, Xiaoke
    Hui, Tao
    Zhao, Lei
    Cheng, Yueqiang
    PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 934 - 946
  • [37] Hardware-assisted fine-grained code-reuse attack detection
    20155201716533
    (1) State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China; (2) Department of Computer Science and Technology, Nanjing University, Nanjing, China; (3) School of Information Systems, Singapore Management University, Singapore, Singapore, 1600, Asterisk Research, Inc.; Deloitte Tohmatsu Risk Services Co., Ltd.; Farsight Security, Inc.; NTT Communications Corporation; Tapad Inc. (Springer Verlag):
  • [38] Malware Provenance: Code Reuse Detection in Malicious Software at Scale
    Upchurch, Jason
    Zhou, Xiaobo
    2016 11TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2016, : 101 - 109
  • [39] The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development
    Calleja, Alejandro
    Tapiador, Juan
    Caballero, Juan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3175 - 3190
  • [40] Efficiently Securing Systems from Code Reuse Attacks
    Kayaalp, Mehmet
    Ozsoy, Meltem
    Abu Ghazaleh, Nael
    Ponomarev, Dmitry
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (05) : 1144 - 1156