通过透明免疫实现二进制应用程序的实际保护

Xinyuan Wang
{"title":"通过透明免疫实现二进制应用程序的实际保护","authors":"Xinyuan Wang","doi":"10.1109/PST52912.2021.9647820","DOIUrl":null,"url":null,"abstract":"In the past few years, massive data breach attacks on large organizations (e.g., Anthem Inc., Equifax) have compromised sensitive data of tens or even hundreds of millions of people. The 2017 Equifax data breach attack has compromised sensitive data of 148 million people and has costed Equifax $\\$ 1.4$ billion as of May 2019. Unfortunately the average time to detect, contain a data breach was 206 days and 73 days respectively in 2019. There is a pressing need to develop practical and deployable capability to detect and block previously unseen, application specific cyberattacks on vulnerable binary applications in real-time. In this paper, we present AppImmu, a practical cyber defense system that can detect and block previously unknown cyber-attacks on vulnerable binary applications in real-time with no false positive. Given a potentially vulnerable ELF binary application, AppImmu can transparently and statically immunize it into an immunized version via binary rewriting. At run-time, AppImmu uses kernel level immunization based anomaly detection techniques to detect and block previously unknown cyberattacks on immunized binary applications without any prior knowledge of the attacks. We have successfully immunized real world large binary applications such as Apache Java execution environment, bash shell, Snort in Linux and have successfully detected and blocked real world data breach attacks (e.g., Apache Strut exploit used in 2017 Equifax data breach attack, Shellshock exploit) in true real-time. Our benchmark experiments show that AppImmu incurs less than 6% run-time overhead in overall system performance, 2.1% run-time overhead for applications under typical workload.","PeriodicalId":144610,"journal":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Practical Protection of Binary Applications via Transparent Immunization\",\"authors\":\"Xinyuan Wang\",\"doi\":\"10.1109/PST52912.2021.9647820\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the past few years, massive data breach attacks on large organizations (e.g., Anthem Inc., Equifax) have compromised sensitive data of tens or even hundreds of millions of people. The 2017 Equifax data breach attack has compromised sensitive data of 148 million people and has costed Equifax $\\\\$ 1.4$ billion as of May 2019. Unfortunately the average time to detect, contain a data breach was 206 days and 73 days respectively in 2019. There is a pressing need to develop practical and deployable capability to detect and block previously unseen, application specific cyberattacks on vulnerable binary applications in real-time. In this paper, we present AppImmu, a practical cyber defense system that can detect and block previously unknown cyber-attacks on vulnerable binary applications in real-time with no false positive. Given a potentially vulnerable ELF binary application, AppImmu can transparently and statically immunize it into an immunized version via binary rewriting. At run-time, AppImmu uses kernel level immunization based anomaly detection techniques to detect and block previously unknown cyberattacks on immunized binary applications without any prior knowledge of the attacks. We have successfully immunized real world large binary applications such as Apache Java execution environment, bash shell, Snort in Linux and have successfully detected and blocked real world data breach attacks (e.g., Apache Strut exploit used in 2017 Equifax data breach attack, Shellshock exploit) in true real-time. Our benchmark experiments show that AppImmu incurs less than 6% run-time overhead in overall system performance, 2.1% run-time overhead for applications under typical workload.\",\"PeriodicalId\":144610,\"journal\":{\"name\":\"2021 18th International Conference on Privacy, Security and Trust (PST)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 18th International Conference on Privacy, Security and Trust (PST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PST52912.2021.9647820\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 18th International Conference on Privacy, Security and Trust (PST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PST52912.2021.9647820","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在过去的几年中,针对大型组织(如Anthem Inc., Equifax)的大规模数据泄露攻击已经泄露了数千万甚至数亿人的敏感数据。2017年Equifax数据泄露攻击已经泄露了1.48亿人的敏感数据,截至2019年5月,Equifax损失了14亿美元。不幸的是,2019年发现和遏制数据泄露的平均时间分别为206天和73天。迫切需要开发实用和可部署的能力,以实时检测和阻止以前未见过的针对易受攻击的二进制应用程序的特定应用程序的网络攻击。在本文中,我们提出了AppImmu,一个实用的网络防御系统,可以实时检测和阻止以前未知的对易受攻击的二进制应用程序的网络攻击,没有误报。给定一个可能易受攻击的ELF二进制应用程序,AppImmu可以通过二进制重写透明且静态地将其免疫为免疫版本。在运行时,AppImmu使用基于内核级免疫的异常检测技术来检测和阻止对免疫的二进制应用程序的先前未知的网络攻击,而无需事先了解攻击。我们已经成功地免疫了现实世界中的大型二进制应用程序,如Apache Java执行环境,bash shell, Linux中的Snort,并成功地实时检测和阻止了现实世界中的数据泄露攻击(例如,2017年Equifax数据泄露攻击中使用的Apache struts漏洞,Shellshock漏洞)。我们的基准测试实验表明,AppImmu在总体系统性能中产生的运行时开销不到6%,在典型工作负载下应用程序的运行时开销为2.1%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Practical Protection of Binary Applications via Transparent Immunization
In the past few years, massive data breach attacks on large organizations (e.g., Anthem Inc., Equifax) have compromised sensitive data of tens or even hundreds of millions of people. The 2017 Equifax data breach attack has compromised sensitive data of 148 million people and has costed Equifax $\$ 1.4$ billion as of May 2019. Unfortunately the average time to detect, contain a data breach was 206 days and 73 days respectively in 2019. There is a pressing need to develop practical and deployable capability to detect and block previously unseen, application specific cyberattacks on vulnerable binary applications in real-time. In this paper, we present AppImmu, a practical cyber defense system that can detect and block previously unknown cyber-attacks on vulnerable binary applications in real-time with no false positive. Given a potentially vulnerable ELF binary application, AppImmu can transparently and statically immunize it into an immunized version via binary rewriting. At run-time, AppImmu uses kernel level immunization based anomaly detection techniques to detect and block previously unknown cyberattacks on immunized binary applications without any prior knowledge of the attacks. We have successfully immunized real world large binary applications such as Apache Java execution environment, bash shell, Snort in Linux and have successfully detected and blocked real world data breach attacks (e.g., Apache Strut exploit used in 2017 Equifax data breach attack, Shellshock exploit) in true real-time. Our benchmark experiments show that AppImmu incurs less than 6% run-time overhead in overall system performance, 2.1% run-time overhead for applications under typical workload.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信