The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse

被引:7
作者
Borrello, Pietro [1 ]
Coppa, Emilio [1 ]
D'Elia, Daniele Cono [1 ]
Demetrescu, Camil [1 ]
机构
[1] Sapienza Univ Rome, Rome, Italy
来源
SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING | 2019年
关键词
Malware; APT; code reuse; ROP; antivirus;
D O I
10.1145/3297280.3297472
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In recent years, researchers have come up with proof of concepts of seemingly benign applications such as InstaStock and Jekyll that remain dormant until triggered by an attacker-crafted condition, which activates a malicious behavior, eluding code review and signing mechanisms. In this paper, we make a step forward by describing a stealthy injection vector design approach based on Return Oriented Programming (ROP) code reuse that provides two main novel features: 1) the ability to defer the specification of the malicious behavior until the attack is struck, allowing fine-grained targeting of the malware and reuse of the same infection vector for delivering multiple payloads over time; 2) the ability to conceal the ROP chain that specifies the malicious behavior to an analyst by using encryption. We argue that such an infection vector might be a dangerous weapon in the hands of advanced persistent threat actors. As an additional contribution, we report on a preliminary experimental investigation that seems to suggest that ROP-encoded malicious payloads are likely to pass unnoticed by current security solutions, making ROP an effective malware design ingredient.
引用
收藏
页码:1962 / 1970
页数:9
相关论文
共 44 条
[1]  
Andriesse Dennis, 2014, P 11 C DET INTR MALW
[2]  
Angelini Marco, 2018, 2018 IEEE S VIS CYB
[3]  
[Anonymous], P 1 INT C CYB SEC CR
[4]  
[Anonymous], 2001, Phrack Magazine, V58
[5]  
[Anonymous], ADDR SPAC LAYOUT RAN
[6]   A Survey of Symbolic Execution Techniques [J].
Baldoni, Roberto ;
Coppa, Emilio ;
D'Elia, Daniele Cono ;
Demetrescu, Camil ;
Finocchi, Irene .
ACM COMPUTING SURVEYS, 2018, 51 (03) :1-39
[7]   Code Obfuscation Against Symbolic Execution Attacks [J].
Banescu, Sebastian ;
Collberg, Christian ;
Ganesh, Vijay ;
Newsham, Zack ;
Pretschner, Alexander .
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, :189-200
[8]  
Biondo Andrea, 2018, 25 ANN NETW DISTR SY
[9]  
Blackthorne J., 2016, 10 USENIX WORKSH OFF
[10]  
Brownlee John, 2011, APPLES IOS JAVASCRIP