{"title":"New directions in covert malware modeling which exploit white-listing","authors":"Jisheng Wang, G. Kesidis, David J. Miller","doi":"10.1109/SARNOF.2007.4567340","DOIUrl":null,"url":null,"abstract":"Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus on the presence of particular I386 instructions, e.g., Sigfree counts the number of ldquousefulrdquo instructions in each request. For both types of systems, a white-listing mechanism, in which some strings or instructions are regarded as innocuous, is necessary to avoid a high false positive rate associated with common content such as URL addresses and peer-to-peer traffic. In this paper, we explore a more sophisticated attack model that not only makes malcode payloads look like nominal ones, but which is also assumed to be both aware of and exploitative of the white-listing itself in forming a Trojan mechanism. In other words, the malware attempts to embed its malcode into the prevalent content that is normally white-listed. If the malcode is encrypted, the attacker will also attempt to obfuscate its plain-text decryption code as much as possible. Both current string-based and instructionbased systems will likely fail to detect such attacks. We propose a comprehensive IDS model in the paper and discuss some potential defensive mechanisms against such attack.","PeriodicalId":293243,"journal":{"name":"2007 IEEE Sarnoff Symposium","volume":"93 13","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE Sarnoff Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SARNOF.2007.4567340","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus on the presence of particular I386 instructions, e.g., Sigfree counts the number of ldquousefulrdquo instructions in each request. For both types of systems, a white-listing mechanism, in which some strings or instructions are regarded as innocuous, is necessary to avoid a high false positive rate associated with common content such as URL addresses and peer-to-peer traffic. In this paper, we explore a more sophisticated attack model that not only makes malcode payloads look like nominal ones, but which is also assumed to be both aware of and exploitative of the white-listing itself in forming a Trojan mechanism. In other words, the malware attempts to embed its malcode into the prevalent content that is normally white-listed. If the malcode is encrypted, the attacker will also attempt to obfuscate its plain-text decryption code as much as possible. Both current string-based and instructionbased systems will likely fail to detect such attacks. We propose a comprehensive IDS model in the paper and discuss some potential defensive mechanisms against such attack.