Extract Me If You Can: Abusing PDF Parsers in Malware Detectors

被引:30
作者
Carmony, Curtis [1 ]
Zhang, Mu [2 ]
Hu, Xunchao [1 ]
Bhaskar, Abhishek Vasisht [1 ]
Yin, Heng [1 ]
机构
[1] Syracuse Univ, Syracuse, NY 13244 USA
[2] NEC Labs Amer, Princeton, NJ USA
来源
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016) | 2016年
基金
美国国家科学基金会;
关键词
D O I
10.14722/ndss.2016.23483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to the popularity of the PDF format and the continued exploitation of Adobe Reader, the detection of malicious PDFs remains a concern. All existing detection techniques rely on the PDF parser to a certain extent, while the complexity of the PDF format leaves an abundant space for parser confusion. To quantify the difference between these parsers and Adobe Reader, we create a reference JavaScript extractor by directly tapping into Adobe Reader at locations identified through a mostly automatic binary analysis technique. By comparing the output of this reference extractor against that of several open-source JavaScript extractors on a large data set obtained from VirusTotal, we are able to identify hundreds of samples which existing extractors fail to extract JavaScript from. By analyzing these samples we are able to identify several weaknesses in each of these extractors. Based on these lessons, we apply several obfuscations on a malicious PDF sample, which can successfully evade all the malware detectors tested. We call this evasion technique a PDF parser confusion attack. Lastly, we demonstrate that the reference JavaScript extractor improves the accuracy of existing JavaScript-based classifiers and how it can be used to mitigate these parser limitations in a real-world setting.
引用
收藏
页数:15
相关论文
共 27 条
[1]  
Berkenbilt Jay., QPDF: A Content-Preserving PDF Transformation System
[2]  
Delugre G, UNDOCUMENTED PASSWOR
[3]  
Dolan-Gavitt Brendan., 2013, 2013 ACM SIGSAC C CO, P839, DOI [10.1145/2508859.2516697, DOI 10.1145/2508859.2516697]
[4]  
Fogla P., 2006, Proceedings of the 13th ACM conference on Computer and communications security, P59
[5]  
Fogla P, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P241
[6]  
Garnaeva Maria., 2016, Kaspersky security bulletin: Overall statistic for 2016
[7]  
Goodin D, 2010, ITS OFFICIAL ADOBE R
[8]  
Henderson A., 2014, P 2014 INT S SOFTWAR, P248
[9]  
Hunt G, 1999, PROCEEDINGS OF THE 3RD USENIX WINDOWS NT SYMPOSIUM, P135
[10]   Abusing File Processing in Malware Detectors for Fun and Profit [J].
Jana, Suman ;
Shmatikov, Vitaly .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :80-94