A Look at Current Malware Problems and Their Solutions.ppt
《A Look at Current Malware Problems and Their Solutions.ppt》由会员分享,可在线阅读,更多相关《A Look at Current Malware Problems and Their Solutions.ppt(22页珍藏版)》请在麦多课文档分享上搜索。
1、A Look at Current Malware Problems and Their Solutions,Tzi-cker Chiueh,2,The Malware Problem,Malware: any program that enters a user machine with malicious intentions, e.g. compromise, hijack or steal The malware problem: how to detect them AND remove them after the fact if necessary Malware detecti
2、on: Network-based Host-based: Symantec is here Remediation is a less explored area, but is increasingly more important Being able to detect a malware program exists on a machine but not able to remove it cleanly is not good enough Data-only attack: phishing,3,How do they get in?,Exploiting bugs in s
3、oftware applications, e.g. buffer overflow vulnerability Entice a user to load and/or install an executable via social engineering, e.g., “password cracking software for porn sites” Embed code within legitimate data, e.g. include an IFrame in a legitimate web page that points to a malicious Javascri
4、pt script Bottom line: As soon as a new way of introducing code into a system is discovered, the hacker will exploit it,4,Vulnerability-Based Attack,Mostly exploit memory bugs/errors in vulnerable programs Buffer overflow: access A23 when A has only twenty elements Integer overflow: assign a negativ
5、e number to an unsigned integer Input argument list overflow: access the fifth argument of a call to printf() with three arguments, e.g. printf(“The answer of Question %d is %d n”, ID, answer) Types of exploits: Code injection Return to libc Data attack,5,Three-Step Recipe,Overflow some data structu
6、re in the victim program, e.g. the stack Sneak a weapon into an airplane Hijack the control of the victim program, e.g. injected code gets executed Take control of the cockpit Perform damaging actions through system calls, e.g. create a remote shell Use the hijacked airplane as a weapon,6,Defenses,S
7、topping any of the three steps will do Preventing overflow through run-time checks Bounds checking, e.g., CASH Integer overflow prevention, e.g., RICH Format string attack prevention, e.g. Lisbon Preventing unauthorized control flow transfer Randomization of address space layout or instruction set C
8、ontrol flow integrity check Preventing illegitimate system calls Checking the order, sites, and arguments of every system call, e.g. PAID, which automatically derives program-specific sandboxing policy,7,Graceful Post-Detection Recovery,Detecting attacks is not enough: In many cases terminating the
9、victimized process is not always an acceptable option Example: Outlook keeps crashing when an incoming email exploits a buffer overflow vulnerability in it Challenge: Upon detecting an attack, how to automatically clean up side effects left by the attack, resume the application, and possibly bypass
10、the attack input next time Idea: Identify a place in victim program that is ready to handle error condition and clean up, e.g., a call site to a COM function Automatically locate such places for each vulnerability exploited,8,Current Consensus,In practice, the vulnerability-based attack problem is l
11、argely contained Non-executable bit (NX) and address space layout randomization (ASLR) can catch most of the low-hanging fruits Do not handle return-to-libc and data attacks System call pattern monitoring (such as PAID) provides a last line of defense Research focus shifts to Automated attack signat
12、ure generation Automated patch generation,9,Malicious Binary Download/Install,Almost always requires user action: Executable (adware, spyware, Trojan horse) Broswer helper object (BHO) ActiveX control Still, many users are susceptible to such social engineering attacks Bug is in a humans brain Ideal
13、 solution: When a piece of executable binary is downloaded, check if it is malicious,10,Blacklisting Approach to Malware Detection,Signature-based scanning: hash value or byte string Still the dominant approach used in AV industry, because of its low false positive rate ( 0.1%) Is running out of ste
14、am because of the packer problem Decoupling of malware creation and obfuscation Signature explosion creates performance overhead and bandwidth cost problem Behavior-based detection API or system call sequence, e.g. open() read() write() High-level behavior, e.g., “copy itself to everyone in address
15、book” Combination of behaviors: FP rate is a main concern,11,Whitelisting Approach to Malware Detection,Trend: malware is increasingly customized and targeted Financial gain consideration encourages keeping low profile Number of malware may be greater than that of goodware Idea: only binaries in the
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ALOOKATCURRENTMALWAREPROBLEMSANDTHEIRSOLUTIONSPPT

链接地址:http://www.mydoc123.com/p-377839.html