BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. BLADE: An Attack-Agnostic Approach for Preventing Drive-By.

Slides:



Advertisements
Similar presentations
Web 2.0 Programming 1 © Tongji University, Computer Science and Technology. Web Web Programming Technology 2012.
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Datamax/MCL Off-Line License Activation Method
On the Design of a Web Browser: Lessons learned from Operating Systems Kapil Singh and Wenke Lee Georgia Institute of Technology Web 2.0 Security and Privacy.
Copyright © 2003 Pearson Education, Inc. Slide 9-1.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Making the System Operational
Secure and Web Browsing Sébastien Dellabella – Computer Security Team.
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
The Internet and the World Wide Web. Una DooneySlide 2Internet and WWW What is the Internet? This is the physical infrastructure or backbone of computers,
Shauvik Roy Choudhary, Alex Orso Georgia Institute of Tech nology.
INFORMATION TECHNOLOGY, THE INTERNET, AND YOU
Software change management
Mehdi Naghavi Spring 1386 Operating Systems Mehdi Naghavi Spring 1386.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Debugging operating systems with time-traveling virtual machines Sam King George Dunlap Peter Chen CoVirt Project, University of Michigan.
© 2009 VMware Inc. All rights reserved View Pool Image Configuration Considerations for Gold Images around Application virtualization and performance.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Test on Input, Output, Processing, & Storage Devices
Acceptance Testing vs. Unit Testing: A Developers Perspective Owen Rogers Rob Styles
SystemCheck for TestNav. Agenda 2 SystemCheck for TestNav – Overview – iPads and Chromebooks – Accessing SystemCheck SystemCheck – Check Your System Proctor.
WebCafé Slide No:1 World Cyber Cafe Association Brings to You Webcafe A Cyber Café Management Software A Software That Will Boost Your Efficiency For Managing.
Spring 2014 RMS/EOC Proctor Caching Training. Agenda 2 Proctor caching overview Downloading & installing Cache test content.
Analyzing Information Flow in JavaScript-based Browser Extensions Mohan Dhawan and Vinod Ganapathy Department of Computer Science Rutgers University 25.
DE2-115 Control Panel - Part I
XP New Perspectives on Introducing Microsoft Office 2003 Tutorial 1 1 Using Common Features of Microsoft Office 2003 Tutorial 1.
Database System Concepts and Architecture
Challenges In The Morphing Threat Landscape Apr 2011, Arnhem Tamas Rudnai, Websense Security Labs.
Executional Architecture
SIMOCODE-DP Software.
DB Relay An Introduction. INSPIRATION Database access is WAY TOO HARD The crux.
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
Addition 1’s to 20.
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
® Microsoft Office 2010 Browser and Basics.
Alex Crowell, Rutgers University Computer Science and Mathematics Advisor: Prof. Danfeng Yao, Computer Science Department.
Week 1.
We will resume in: 25 Minutes.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Automated Web Patrol with Strider HoneyMonkeys Present by Zhichun Li.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Data Security.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
SURF:SURF: Detecting and Measuring Search Poisoning Long Lu, Roberto Perdisci, and Wenke Lee Georgia Tech and University of Georgia.
Behavior-based Spyware Detection By Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna Greg Banks, Giovanni Vigna, and.
A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Long Lu, Wenke Lee College of Computing, Georgia Institute of Technology Vinod Yegneswaran, Phillip Porras SRI International ACM CCS (Oct,2010) Long Lu,
2011/11/1 1 Long Lu, Wenke Lee College of Computing Georgia Inst. of Technology Roberto Perdisci Dept. of Computer Science University of Georgia.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
WebWatcher A Lightweight Tool for Analyzing Web Server Logs Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Web Servers (IIS and Apache)
Presentation transcript:

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections Long Lu 1, Vinod Yegneswaran 2, Phillip Porras 2, Wenke Lee Georgia Tech 2 2 SRI International Oct. 6th, th ACM Conference on Computer and Communications Security

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Malware Propagation Facts One common path: the Internet Two fundamental approaches: Drive-by download Vs. Social engineering Drive-by Download most favored by today’s attackers Counts for more than 60% malware infections [ISC09, Dasiant10, Google10] 17th ACM Conference on Computer and Communications Security 2

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Drive-by Download 17th ACM Conference on Computer and Communications Security 3 Definition: Drive-by Download - An attack in which the mere connection to a website results in the installation of a binary executable without the web-user’s authorization. A click-then-infect scheme Exploiting client-side vulnerabilities Strong penetration Silent infection Easy to launch

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Regular browsing & downloading 17th ACM Conference on Computer and Communications Security 4 Go to RequestsHTTP Responses Browser automatically saves and renders supported file types (*.html, *.js, *.jpeg, etc.)

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Regular browsing & downloading 17th ACM Conference on Computer and Communications Security 5 Save x.exe from a.com? HTTP Response Browser asks for user consent before saving unsupported file types (*.exe, *.zip, *.dll, etc.) Go to HTTP Request Content-Type: application/octet-stream;

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Drive-by download attack 17th ACM Conference on Computer and Communications Security 6 Go to HTTP RequestsHTTP Responses Requests without user’s consent Response from malware host Essential steps: 1.Exploit 2.Download 3.Execute No user consent required!

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Observations 17th ACM Conference on Computer and Communications Security 7 Browsers handle supported content automatically unsupported content based on user’s permissions Golden Rule: Browsers should never automatically download and execute binary files without user consent. All drive-by downloads inevitably break this rule. No drive-by download will succeed if this rule holds.

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. BLADE Approach Goal: to eliminate drive-by malware infections Approach: unconsented execution prevention Exploit and vulnerability agnostic Browser independent 17th ACM Conference on Computer and Communications Security 8 User Intent tracking Consented download correlation Unconsented download execution prevention Essential steps: 1.Exploit 2.Download 3.Execute

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. BLADE Design Assumptions Browsers may be fully compromised; OS is trusted; H/W is trusted. Design choices BLADE is designed as a kernel driver; User intents are inferred from H/W and window events ; Consented download is correlated and verified; Unconsented download are contained in “SecureZone”. 17th ACM Conference on Computer and Communications Security 9

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. BLADE HW Evt Tracer Screen Parser Correlator I/O Redirector Supervisor BLADE Architecture 17th ACM Conference on Computer and Communications Security 10 File System Secure Zone Input Device Driver User interaction Windowing Screen I/O Transport Driver Net I/O File I/O FileSys View

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. How it works – regular download 17th ACM Conference on Computer and Communications Security 11 FileSys View File System Secure Zone Screen Parser Locate consent button(s) Parse correlation information H/W Evt. Tracer Monitor mouse and keyboard input I/O Redirector Redirect disk writes from browsers CorrelatorCorrelator Discover candidate and verify its origin Map it to the regular file system

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. How it works – drive-by download 17th ACM Conference on Computer and Communications Security 12 I/O Redirector Redirect disk writes from browsers FileSys View Secure Zone I/O Redirector Alert when execution is attempted

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Implementations Screen Reader Monitors certain windowing events Parses internal composition of consent dialogues 17th ACM Conference on Computer and Communications Security 13

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Implementations H/W Event Tracer Resides above device drivers Listens to IRPs 17th ACM Conference on Computer and Communications Security 14 OS I/O Mgr. Input Driver H/W Evt. Tracer

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Implementations I/O Redirector Built as a file system mini-filter Redirects file accesses Provides a merged view Correlator Uses transport driver interface Records streams coming from download sources Content-base correlation and verification 17th ACM Conference on Computer and Communications Security 15

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Empirical Evaluation An automated test bed Harvest new real-world malicious URLs daily VMs with various software configurations 17th ACM Conference on Computer and Communications Security 16 3 months visits 7925 defende d 0 missed

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Empirical Evaluation 17th ACM Conference on Computer and Communications Security 17

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Using 19 specifically hand-crafted exploits Covering all common exploiting techniques Targeting at diverse vulnerabilities (11 zero-days) BLADE prevented all 19 infection attempts 17th ACM Conference on Computer and Communications Security 18 Attack Coverage Evaluation

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Security analysis Potential ways to evade/attack BLADE 17th ACM Conference on Computer and Communications Security 19 Fake GUI Fake user response Spoofing attacks Replace download file Piggybacking Download hijacking Execute in Secure Zone Evade I/O redirection Coercing attacks

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Benign Website Evaluation Normal file downloads Normal site-browsing 17th ACM Conference on Computer and Communications Security sites 4 browsers 120 downloads 0 FP 5 sites 6 categories 120 pages 0 FP

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Performance Evaluation Per-component test End-to-end test Worst case overhead – 3% Negligible on average 17th ACM Conference on Computer and Communications Security 21

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Limitations Social engineering attacks In-memory execution of shellcode Only effective against binary executables 17th ACM Conference on Computer and Communications Security 22

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections, L. Lu et al. Q&A 17th ACM Conference on Computer and Communications Security 23