DocumentCode :
3477281
Title :
Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction
Author :
Lin, Zhiqiang ; Zhang, Xiangyu ; Xu, Dongyan
Author_Institution :
Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
fYear :
2010
fDate :
June 28 2010-July 1 2010
Firstpage :
281
Lastpage :
290
Abstract :
We introduce the reuse-oriented camouflaging trojan-a new threat to legitimate software binaries. To perform a malicious action, such a trojan identifies and reuses an existing function in a legal binary program instead of implementing the function itself. Furthermore, this trojan is stealthy in that the malicious invocation of a targeted function usually takes place in a location where it is legal to do so, closely mimicking a legal invocation. At the network level, the victim binary can still follow its communication protocol without exhibiting any anomalous behavior. Meanwhile, many close-source shareware binaries are rich in functions that can be maliciously “reused”, making them attractive targets of this type of attack. In this paper, we present a framework to determine if a given binary program is vulnerable to this attack and to construct a concrete trojan if so. Our experiments with a number of real-world software binaries demonstrate that the reuse-oriented camouflaging trojans are a real threat and vulnerabilities of this type in legal binaries can be effectively revealed and confirmed.
Keywords :
invasive software; public domain software; attack construction; close-source shareware binaries; communication protocol; legal binary program; legal invocation; reuse-oriented camouflaging trojan; vulnerability detection; Computer science; Computer worms; Concrete; Law; Legal factors; Logic; Payloads; Protocols; Security; Sockets;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on
Conference_Location :
Chicago, IL
Print_ISBN :
978-1-4244-7500-1
Electronic_ISBN :
978-1-4244-7499-8
Type :
conf
DOI :
10.1109/DSN.2010.5544305
Filename :
5544305
Link To Document :
بازگشت