1 / 31

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections

17th ACM Conference on Computer and Communications Security. CCS’10 , October 4–8, 2010, Chicago, Illinois, USA. BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections. Long Luy , Vinod Yegneswaranz , Phillip Porrasz , Wenke Lee Georgia Institute of Technology,

candid
Download Presentation

BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 17th ACM Conference on Computer and Communications Security CCS’10, October 4–8, 2010, Chicago, Illinois, USA BLADE: An Attack-Agnostic Approach for Preventing Drive-By Malware Infections Long Luy, VinodYegneswaranz, Phillip Porrasz, Wenke Lee Georgia Institute of Technology, SRI International 2010.12.04 Mike Hsiao

  2. Demo • BLADE Demo against Real-world Drive-by Download Site • http://www.youtube.com/watch?v=9emHejh8hWE

  3. Outline • Introduction • The BLADE Approach to Drive-By Exploit Defense • Drive-By Exploits • The BLADE Threat Model, Design Objectives, and Challenges • The BLADE System Architecture • Screen Parser, Supervisor, Hardware Event Tracer • Correlator, I/O Redirector • Evaluation • Security Analysis • Related Work • Conclusion and Future Work

  4. Introduction • Achilles heel of enterprise network security • vulnerable web browsers • the growing plethora of their complex applets • This problem is compounded by the increasing diversity of browser plug-inapplications. • Client-sideexploits now dominate the traditional push-based malware propagation strategies • (that were well established by Internet scanning worms and viruses).

  5. Introduction (cont’d) • BLADE, a system that effectively immunizes a host against all forms of drive-by downloadmalware installs. • BLADE is both attack and browser agnostic. • BLADE relies on limited semantic knowledge about a handful of user interface (UI) elements common across web browser applications. • BLADE focused on browser protection, but can be generalized to other applications.

  6. Introduction (cont’d) • Browsers handle the content they receive in either of two basic ways • supported file types (e.g., html, jpeg, pdf) • unsupported file types (e.g., exe, zip). • While browsers silently fetch and render all supported file types, they must prompt the user when an unsupported type is encountered. • The objective of the drive-by download is to deliver malicious binaries through the browser bypassing the standard unsupported-type user prompt interactions.

  7. Introduction (cont’d) 1 collect user download authorizations expressed during interactions with browsers 2 tracks the user’s physical interactions (e.g., mouse clicks) with these dialog windows 3 contain disk footprints of unconsented data delivered through supervised processes

  8. The BLADE Approach to Drive-By Exploit Defense • The mere act of connecting one’s web browser to the wrong website may result in the installation of an application without the user’s authorization or knowledge.

  9. Drive-By Exploits • The goal of the drive-by exploit is to take effective, temporary control of the client web browser for the purpose of • forcing it to fetch, store, and then execute a binary application (e.g., .exe, .dll, .msi, .sys) • without revealing to the human user that these actions have taken place.

  10. Drive-By Exploits: Three Phases • Shellcode injection phase • The first challenge in delivering the drive-by exploit is gaining temporary control of the browser. • all drive-by exploits begin with a remote code injection • such as buffer overflow exploit against component within the browser process, e.g., the ActiveX interpreter, a multimedia plugin, the PDF object, the Flash player.

  11. Drive-By Exploits: Three Phases(cont’d) • Shellcodeexecution phase • inject a small shellcode segment within the browser processto conduct covert binary installation • Covert binary install phase • fetching a remote malware application from some remote source on the Internet, storing it within the file system and executing it on the victim’s host

  12. The BLADE Threat Model, DesignObjectives, and Challenges • An adversary conducting drive-by download attacks is allowed to hijack control of a vulnerable browser and inject remote code. • BLADE does not attempt to halt the drive-by exploit at the shellcode injection phase or the shellcode execution phase. • From BLADE’s perspective, the drive-by download attack conducts a series of steps designed to bypass the normal user-content-handling.

  13. Key Technical Challenges • Real-time user authorization capture and interpretation • Robust correlation between authorization and download content • Stringent enforcement of execution prevention • Browser agnostic enforcement • Exploit and evasion independence • Efficient and usable system performance

  14. The BLADE System Architecture • Front-end components (information) • Screen Parser • monitors kernel windowing events as the status of on-screen UI changes in real time • signals the Supervisor upon the appearance of a download consent dialog(or authorization dialog) on the screen • A number of signatures are shared by all UI instances of that class. • locates the respective positions of confirmation elements on these UI dialogs (SAVE button), and extract the download identity information (URL) • Hardware-Event Tracer • intercept subsequent mouse and key-board input events • Supervisor

  15. The BLADE System Architecture (cont’d)

  16. The BLADE System Architecture (cont’d) • Back-end components (inferring) • Correlator • validatesthe authenticity of the consequent file corresponding to a user download consent • matches a file f with a tuple(remote url, local path)when fis saved at pathwith data content received from url • I/O Redirector • persistently guarantees that uncorrelated downloads can do no harm by establishing the secure zone

  17. Correlator • One of the key challenges in BLADE is establishing the 1-1 mapping between user download authorizations and downloaded files. • (URL, Path). • Whenever a file has been written with the same path and name as that of a pending authorization, the Correlator marks it as a correlation candidateand starts the validation process immediately. • If the content of a particular download-candidate appears in a TCP stream log that corresponds to the source URL recorded in the authorization tuple.

  18. I/O Redirector • The design of the secure zone is based on the closure property of browser disk writes derived from our study of generic disk access patterns by browsers.

  19. I/O Redirector Policies • Any new file created by a supervised process is redirected to the secure zone. • Any existing file modified by a supervised process is saved as a shadow copy in the secure zone, without change to the original file. • I/O redirection is transparent to supervised processes. • I/O redirection only applies to supervised processes. Files in the secure zone can only be accessed via redirection. • No execution is allowed for files in the secure zone. • Any file correlated with a user download authorization is remapped to the file system.

  20. I/O Redirector

  21. Evaluation: Effectiveness Empirical Daily Evaluation on Malware URL Lists

  22. Evaluation: Effectiveness(cont’d) virustotal.com is a company for testing antivirus tools push malware The testbed has been operational for 3 months and visited 3,992 unique malicious URLs (please see www.blade-defender.org/eval-lab for updated statistics and results).

  23. Evaluation: Effectiveness(cont’d) a wider set of hand-crafted attacks and more browser versions

  24. Evaluation: Effectiveness(cont’d) benign web sites, i.e., the false positive rate • The user’s authorization cannot be inferred, which leaves the resulting download in the secure zone as untrusted • Alegitimate browser download seeks to execute benign logic without the user’s consent, which represents a violation of our root assumption.

  25. Evaluation: Performance (cont’d) • Macro performance evaluation • Browser rendering delays • Authorized download delays

  26. Security Analysis • Attacks and Built-in Countermeasures • Spoofing attacks • The attacker may attempt to drop malware directly onto the local file system, without being redirected to the secure zone. (fool BLADE, spoofing browser GUI) • Download injection and process hijacking attacks • The attacker may move a downloaded malware instance out of the secure zone and then execute it. • The attacker may also hijack an unsupervised process whose file I/O is not redirected.

  27. Limitations • BLADE does not prevent social engineering attacks where the user authorizes the download and installation of malicious binaries disguised as benign applications. • BLADE does not prevent in-memory execution of transient malware, which could be scripts such as JavaScript bots or x86 code inserted into memory by exploits. • BLADE is dependent on explicit download-consent UI, which is optional in certain browsers. • BLADE is effective against binary executables and does not prevent the download and installation of interpreted scripts.

  28. Related Work: Internet measurement studies • [23] Moshchuk, A crawler-based study of spyware on the web, NDSS 2006. • 18 million URLs, finding scripted drive-by downloads in 5.9%. • [27] Provos, All your iframes point to us, USENIX Security 2008. • [28] Provos, The ghost in the browser analysis of web-based malware, HotBots 2007. • [32] Seifert, Know your enemy: Malicious web servers, honeynet2007.

  29. Related Work: Website survey systems and proxy services • Blacklist services • stopbadware.org • Strider HoneyMonkey • phoneyc • Proxy server • SpyBye • SecureBrowing • BrowserShield • SpyProxy

  30. Related Work • Network- and host-based malware defense systems • BotHunter, BotSniffer • AntiVirus • [25] J. Oberheide, E. Cooke, and F. Jahanian. Cloudav: N-version antivirus in the network cloud. In Proceedings of 17th USENIX Security Symposium, 2008. • Sandboxing/Isolation systems

  31. Conclusion and Future Work • Drive-by download infection. • Track all browser-to-human interactions • Attack agnostic (0-day) • In-memory attack! • program execution model?

More Related