FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole-System Dynamic Information Flow Tracking

被引:5
作者
Arefi, Meisam Navaki [1 ]
Alexander, Geoffrey [1 ]
Rokham, Hooman [1 ]
Chen, Aokun [4 ]
Faloutsos, Michalis [3 ]
Wei, Xuetao [2 ]
Oliveira, Daniela Seabra [4 ]
Crandall, Jedidiah R. [1 ]
机构
[1] Univ New Mexico, Albuquerque, NM 87131 USA
[2] Univ Cincinnati, Cincinnati, OH 45221 USA
[3] Univ Calif Riverside, Riverside, CA 92521 USA
[4] Univ Florida, Gainesville, FL 32611 USA
来源
2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) | 2018年
基金
美国国家科学基金会;
关键词
Dynamic Information Flow Tracking; In-memory Injection; Malware Analysis;
D O I
10.1109/DSN.2018.00034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In-memory injection attacks are extremely challenging to reverse engineer because they operate stealthily without leaving artifacts in the system or in any easily observable events from outside of a virtual machine. Because these attacks perform their actions in memory only, current malware analysis solutions cannot expose their behavior. This paper introduces FAROS 1, a reverse engineering tool for Windows malware analysis based on dynamic information flow tracking (DIFT), which can flag stealthy in-memory-only malware injection attacks by leveraging the synergy of: (i) whole-system taint analysis; (ii) per security policy-based handling of the challenge of indirect flows via the application of tags of different types, and (iii) the use of tags with fine-grained provenance information. We evaluated FAROS with six advanced in-memory-injecting malware and it flagged the attacks for all samples. We also analyzed FAROS' false positive rate with 90 non-injecting malware samples and 14 benign software from various categories. FAROS presented a very low false positive rate of 2%, which shows its potential towards practical solutions against advanced in-memory-only anti-reverse-engineering attacks.
引用
收藏
页码:231 / 242
页数:12
相关论文
共 32 条
[1]  
[Anonymous], 2012, Practical malware analysis: the hands-on guide to dissecting malicious software
[2]  
[Anonymous], 2004, P INT S COD GEN OPT
[3]  
Bacs A., 2012, P DIMVA, P144
[4]  
Bellard F., 2005, P ANN TECHN C USENIX
[5]  
Cavallaro L, 2008, LECT NOTES COMPUT SC, V5137, P143, DOI 10.1007/978-3-540-70542-0_8
[6]  
Clause J., 2007, P 2007 INT S SOFTW T, P196, DOI DOI 10.1145/1273463.1273490
[7]  
Crandall J. R., 2006, ACM Transactions on Architecture and Code Optimization, V3, P359, DOI 10.1145/1187976.1187977
[8]  
Crandall JR, 2004, INT SYMP MICROARCH, P221
[9]  
Dalton M, 2007, CONF PROC INT SYMP C, P482, DOI 10.1145/1273440.1250722
[10]  
Dinaburg A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P51