Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring

Ming-Wei Wu, S. Kuo
{"title":"Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring","authors":"Ming-Wei Wu, S. Kuo","doi":"10.1109/PRDC.2007.41","DOIUrl":null,"url":null,"abstract":"Spyware infection that exploits the vulnerabilities of client-side Web application, especially browser, to install malicious programs has gain significant popularity in recent years. Unlike traditional infection vectors such as software bundling in shareware/freeware and placing Trojan in pirated version of commercial software that generally requires user consent to be successfully installed, Web-based spyware attempts exploits on browser vulnerabilities to achieve automatic installation (a.k.a. drive-by download). In this paper, we characterize the behavior of spyware instances collected from software bundling and of those collected from exploit Web pages in terms of auto-start extensibility points (ASEP) and other spyware behaviors. We use a tool called STARS (Stateful Threat-Aware Removal System) that can monitor critical areas of the system and detect advanced feature of a spyware instance such as self- healing. Experimental results show that traditional spyware and Web-based spyware used a different combination set of ASEP to resist deletion. The latter one hooks to low-level system components and loaded as services and/or drivers employing Layered Service Provider (LSP) to interpret network traffic. Our observations identify the unique behaviors performed by the Web-based spyware that are rarely found on traditional spyware.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PRDC.2007.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

Spyware infection that exploits the vulnerabilities of client-side Web application, especially browser, to install malicious programs has gain significant popularity in recent years. Unlike traditional infection vectors such as software bundling in shareware/freeware and placing Trojan in pirated version of commercial software that generally requires user consent to be successfully installed, Web-based spyware attempts exploits on browser vulnerabilities to achieve automatic installation (a.k.a. drive-by download). In this paper, we characterize the behavior of spyware instances collected from software bundling and of those collected from exploit Web pages in terms of auto-start extensibility points (ASEP) and other spyware behaviors. We use a tool called STARS (Stateful Threat-Aware Removal System) that can monitor critical areas of the system and detect advanced feature of a spyware instance such as self- healing. Experimental results show that traditional spyware and Web-based spyware used a different combination set of ASEP to resist deletion. The latter one hooks to low-level system components and loaded as services and/or drivers employing Layered Service Provider (LSP) to interpret network traffic. Our observations identify the unique behaviors performed by the Web-based spyware that are rarely found on traditional spyware.
用状态行为监测检测基于web的间谍软件入侵
近年来,利用客户端Web应用程序(尤其是浏览器)的漏洞来安装恶意程序的间谍软件感染越来越流行。与传统的感染媒介不同,例如在共享软件/免费软件中捆绑软件,以及在通常需要用户同意才能成功安装的盗版商业软件中放置木马,基于web的间谍软件试图利用浏览器漏洞来实现自动安装(也称为“驱车下载”)。在本文中,我们根据自动启动扩展点(ASEP)和其他间谍软件行为描述了从软件捆绑收集的间谍软件实例和从漏洞Web页面收集的间谍软件实例的行为。我们使用一种名为STARS(状态威胁感知移除系统)的工具,它可以监控系统的关键区域,并检测间谍软件实例的高级功能,如自我修复。实验结果表明,传统间谍软件和基于web的间谍软件采用了不同的ASEP组合集来抵抗删除。后者连接到底层系统组件,并作为服务和/或驱动程序加载,使用分层服务提供商(LSP)来解释网络流量。我们的观察确定了基于web的间谍软件执行的独特行为,这些行为在传统间谍软件中很少发现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信