• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation”, (2006)

by G Portokalidis, A Slowinska, H Bos
Venue:Proceedings of the 2006 EuroSys
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 108
Next 10 →

Vigilante: End-to-End Containment of Internet Worm Epidemics

by Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham , 2008
"... Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. ..."
Abstract - Cited by 304 (6 self) - Add to MetaCart
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. We propose Vigilante, a new end-to-end architecture to contain worms automatically that addresses these limitations. In Vigilante, hosts detect worms by instrumenting vulnerable programs to analyze infection attempts. We introduce dynamic data-flow analysis: a broad-coverage host-based algorithm that can detect unknown worms by tracking the flow of data from network messages and disallowing unsafe uses of this data. We also show how to integrate other host-based detection mechanisms into the Vigilante architecture. Upon detection, hosts generate self-certifying alerts (SCAs), a new type of security alert that can be inexpensively verified by any vulnerable host. Using SCAs, hosts can cooperate to contain an outbreak, without having to trust each other. Vigilante broadcasts SCAs over an overlay network that propagates alerts rapidly and resiliently. Hosts receiving an SCA protect themselves by generating filters with vulnerability condition slicing: an algorithm that performs dynamic analysis of the vulnerable program to identify control-flow conditions that lead

Panorama: Capturing system-wide information flow for malware detection and analysis

by Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, Engin Kirda - In Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS’07 , 2007
"... Malicious programs spy on users ’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undesirable actions. Unfortunately, existing techniques for detecting malware and analyzing unknown code samples are insufficie ..."
Abstract - Cited by 195 (28 self) - Add to MetaCart
Malicious programs spy on users ’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undesirable actions. Unfortunately, existing techniques for detecting malware and analyzing unknown code samples are insufficient and have significant shortcomings. We observe that malicious information access and processing behavior is the fundamental trait of numerous malware categories breaching users ’ privacy (including keyloggers, password thieves, network sniffers, stealth backdoors, spyware and rootkits), which separates these malicious applications from benign software. We propose a system, Panorama, to detect and analyze malware by capturing this fundamental trait. In our extensive experiments, Panorama successfully detected all the malware samples and had very few false positives. Furthermore, by using Google Desktop as a case study, we show that our system can accurately capture its information access and processing behavior, and we can confirm that it does send back sensitive information to remote servers in certain settings. We believe that a system such as Panorama will offer indispensable assistance to code analysts and malware researchers by enabling them to quickly comprehend the behavior and innerworkings of an unknown sample.
(Show Context)

Citation Context

... hidden entries, while our approach recognizes the rootkit directly.sDynamic Taint Analysis. Dynamic taint analysis has been applied to solve and analyze other security related problems. Many systems =-=[26, 13, 28, 12, 35]-=- detect exploits by tracking the data from untrusted soruces such as the network being misused to alter the control flow. Chow et al. made use of whole-system dynamic taint analysis to analyze how sen...

Dynamic Spyware Analysis

by Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin - In Proceedings of the 2007 Usenix Annual Conference (Usenix’07 , 2007
"... Spyware is a class of malicious code that is surreptitiously installed on victims ’ machines. Once active, it silently monitors the behavior of users, records their web surfing habits, and steals their passwords. Current anti-spyware tools operate in a way similar to traditional virus scanners. That ..."
Abstract - Cited by 110 (19 self) - Add to MetaCart
Spyware is a class of malicious code that is surreptitiously installed on victims ’ machines. Once active, it silently monitors the behavior of users, records their web surfing habits, and steals their passwords. Current anti-spyware tools operate in a way similar to traditional virus scanners. That is, they check unknown programs against signatures associated with known spyware instances. Unfortunately, these techniques cannot identify novel spyware, require frequent updates to signature databases, and are easy to evade by code obfuscation. In this paper, we present a novel dynamic analysis approach that precisely tracks the flow of sensitive information as it is processed by the web browser and any loaded browser helper objects. Using the results of our analysis, we can identify unknown components as spyware and provide comprehensive reports on their behavior. The techniques presented in this paper address limitations of our previous work on spyware detection and significantly improve the quality and richness of our analysis. In particular, our approach allows a human analyst to observe the actual flows of sensitive data in the system. Based on this information, it is possible to precisely determine which sensitive data is accessed and where this data is sent to. To demonstrate the effectiveness of the detection and the comprehensiveness of the generated reports, we evaluated our system on a substantial body of spyware and benign samples. 1
(Show Context)

Citation Context

...t Propagation Data Dependencies. Tainting allows to tag data elements of interest and track their propagation throughout the system. Similar to a number of previous systems that use taint propagation =-=[2, 6, 7, 22, 23]-=-, our taint analysis is capable of tracking data dependencies. To this end, the taint engine marks all bytes of the output of an operation as tainted whenever any byte of any input operand is tainted....

Securing Software by Enforcing Data-flow Integrity

by Miguel Castro - In Proceedings of the 7th Symposium on Operating Systems Design and Implementation , 2006
"... Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to unintended locations. We present a simple technique that prevents these attacks by enforcing data-flow integrity. It compu ..."
Abstract - Cited by 110 (6 self) - Add to MetaCart
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to unintended locations. We present a simple technique that prevents these attacks by enforcing data-flow integrity. It computes a data-flow graph using static analysis, and it instruments the program to ensure that the flow of data at runtime is allowed by the data-flow graph. We describe an efficient implementation of data-flow integrity enforcement that uses static analysis to reduce instrumentation overhead. This implementation can be used in practice to detect a broad class of attacks and errors because it can be applied automatically to C and C++ programs without modifications, it does not have false positives, and it has low overhead. 1
(Show Context)

Citation Context

...ding [27] and control-flow integrity [5] provide a generic defense against control-data attacks but they cannot defend against non-control-data attacks. Techniques that perform dynamic taint analysis =-=[37, 15, 19, 31, 13, 16, 22, 33]-=- can prevent control-data attacks and they can prevent some non-control-data attacks [37, 16, 13], but they may have false positives and they incur a very high overhead without hardware support. We im...

D.: Polyglot: automatic extraction of protocol message format using dynamic binary analysis

by Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Song - In: CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security , 2007
"... Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for many network security applications. Recent work [17] has proposed protocol reverse engineering by using clustering on netwo ..."
Abstract - Cited by 109 (21 self) - Add to MetaCart
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for many network security applications. Recent work [17] has proposed protocol reverse engineering by using clustering on network traces. That kind of approach is limited by the lack of semantic information on network traces. In this paper we propose a new approach using program binaries. Our approach, shadowing, uses dynamic analysis and is based on a unique intuition—the way that an implementation of the protocol processes the received application data reveals a wealth of information about the protocol message format. We have implemented our approach in a system called Polyglot and evaluated it extensively using real-world implementations of five different protocols: DNS, HTTP, IRC, Samba and ICQ. We compare our results with the manually crafted message format, included in Wireshark, one of the state-ofthe-art protocol analyzers. The differences we find are small and usually due to different implementations handling fields in different ways. Finding such differences between implementations is an added benefit, as they are important for problems such as fingerprint generation, fuzzing, and error detection.
(Show Context)

Citation Context

...at contains a record of all the instructions performed by the program. The execution trace forms the input to our analysis in the second phase. The execution monitor implements dynamic taint analysis =-=[13, 14, 15, 28, 34, 35]-=-. In dynamic taint analysis, inputsdata of interest is marked (i.e., tainted) when it arrives and any instruction that operates on the tainted data (e.g., moving it to another location or performing a...

Practical taint-based protection using demand emulation

by Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand - EUROSYS '06 , 2006
"... Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received from the network as it propagates through a system and to prevent its execution. Unlike past approaches to taint tracking, w ..."
Abstract - Cited by 91 (0 self) - Add to MetaCart
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received from the network as it propagates through a system and to prevent its execution. Unlike past approaches to taint tracking, which track tainted data by running the system completely in an emulator or simulator, resulting in considerable execution overhead, our work demonstrates the ability to dynamically switch a running system between virtualized and emulated execution. Using this technique, we are able to explore hardware support for taint-based protection that is deployable in real-world situations, as emulation is only used when tainted data is being processed by the CPU. By modifying the CPU, memory, and I/O devices to support taint tracking and protection, we guarantee that data received from the network may not be executed, even if it is written to, and later read from disk. We demonstrate near native speeds for workloads where little taint data is present.
(Show Context)

Citation Context

...res for emerging attacks. Somewhat similarly, Vigilante [14] uses dedicated “detection engines”, some of which using data-flow analysis based on binary rewriting, to generate attack signatures. Argos =-=[15]-=- extends Vigilante by utilizing emulation to allow system-wide tracking of tainted data independent of the operating system. These systems depend critically on the generation, dissemination, and incor...

Paranoid android: versatile protection for smartphones.

by Georgios Portokalidis , Philip Homburg , Kostas Anagnostakis Niometris , R&d Singapore , Herbert Bos - In Proc. ACSAC, , 2010
"... ABSTRACT Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers. They are also quite different from PCs, so that PCoriented solutions are not always applicable, or do not offe ..."
Abstract - Cited by 86 (7 self) - Add to MetaCart
ABSTRACT Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers. They are also quite different from PCs, so that PCoriented solutions are not always applicable, or do not offer comprehensive security. We propose an alternative solution, where security checks are applied on remote security servers that host exact replicas of the phones in virtual environments. The servers are not subject to the same constraints, allowing us to apply multiple detection techniques simultaneously. We implemented a prototype of this security model for Android phones, and show that it is both practical and scalable: we generate no more than 2KiB/s and 64B/s of trace data for high-loads and idle operation respectively, and are able to support more than a hundred replicas running on a single server.
(Show Context)

Citation Context

...ted on the modified QEMU [1] emulator that comes with the official SDK. We do not perform a security evaluation of our taint analysis implemention on QEMU, as it has been sufficiently demonstrated by =-=[35]-=-. 4.1 Data Volume The volume of data generated by the tracer constitutes an important metric, as it directly affects the amount of energy required to transmit the trace log to the server, and the stor...

Debugging in the (Very) Large: Ten Years of Implementation and Experience

by Kirk Glerum, Kinshuman Kinshumann, Steve Greenberg, Gabriel Aul, Vince Orgovan, Greg Nichols, David Grant, Gretchen Loihle, Galen Hunt
"... Windows Error Reporting (WER) is a distributed system that automates the processing of error reports coming from an installed base of a billion machines. WER has collected billions of error reports in ten years of operation. It collects error data automatically and classifies errors into buckets, wh ..."
Abstract - Cited by 72 (1 self) - Add to MetaCart
Windows Error Reporting (WER) is a distributed system that automates the processing of error reports coming from an installed base of a billion machines. WER has collected billions of error reports in ten years of operation. It collects error data automatically and classifies errors into buckets, which are used to prioritize developer effort and report fixes to users. WER uses a progressive approach to data collection, which minimizes overhead for most reports yet allows developers to collect detailed information when needed. WER takes advantage of its scale to use error statistics as a tool in debugging; this allows developers to isolate bugs that could not be found at smaller scale. WER has been designed for large scale: one pair of database servers can record all the errors that occur on all Windows computers worldwide.
(Show Context)

Citation Context

...ram failure, to cut debugging time and reduce the transfer of non-anonymized data. By default, Triage is enabled only after a failed run because it imposes a runtime overhead. Vigilante [9] and Argos =-=[27]-=- suppress failures on some computers by detecting security exploits on other computers and generating filters to block bad input or executions. Failure-oblivious computing [29] and Rx [28] hide failur...

Scalable, Behavior-Based Malware Clustering

by Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, Engin Kirda
"... Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a malicious program in a controlled environment and produce reports that summarize the program’s actions. Of course, the pro ..."
Abstract - Cited by 70 (5 self) - Add to MetaCart
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a malicious program in a controlled environment and produce reports that summarize the program’s actions. Of course, the problem of analyzing the reports still remains. Recently, researchers have started to explore automated clustering techniques that help to identify samples that exhibit similar behavior. This allows an analyst to discard reports of samples that have been seen before, while focusing on novel, interesting threats. Unfortunately, previous techniques do not scale well and frequently fail to generalize the observed activity well enough to recognize related malware. In this paper, we propose a scalable clustering approach to identify and group malware samples that exhibit similar behavior. For this, we first perform dynamic analysis to obtain the execution traces of malware programs. These execution traces are then generalized into behavioral profiles, which characterize the activity of a program in more abstract terms. The profiles serve as input to an efficient clustering algorithm that allows us to handle sample sets that are an order of magnitude larger than previous approaches. We have applied our system to real-world malware collections. The results demonstrate that our technique is able to recognize and group malware programs that behave similarly, achieving a better precision than previous approaches. To underline the scalability of the system, we clustered a set of more than 75 thousand samples in less than three hours. 1
(Show Context)

Citation Context

...urity. For example, it has been successfully applied to the detection of exploits that hijack the control flow of a program and, in some cases, automatic signature generation against detected threats =-=[23, 39, 41]-=-. Similar to our approach, there are systems that employ tainting for extracting characteristic information flows from malware binaries. Yin et al. [46] extended Qemu with data tainting to capture sys...

Automatic Network Protocol Analysis

by Gilbert Wondracek, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda - Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS’08 , 2008
"... ..."
Abstract - Cited by 67 (4 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

... the operating system and large applications. Other researchers used taint analysis to monitor program execution for the use of taintedsdata as arguments to control flow instructions or systems calls =-=[7, 8, 22, 26]-=-. The aim of these systems is to identify memory corruption exploits at run-time, and, in some cases, to create signatures for detected attacks. Finally, taint analysis has also been used to detect ma...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University