application level reconnaissance timing channel attacks
play

Application-Level Reconnaissance: Timing Channel Attacks Against - PowerPoint PPT Presentation

Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software Mohammed I. Al-Saleh and Jedidiah R. Crandall Server Reconnaissance OS & Services ports Client Server Client Reconnaissance Hmmm, what can I get about


  1. Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software Mohammed I. Al-Saleh and Jedidiah R. Crandall

  2. Server Reconnaissance OS & Services ports Client Server

  3. Client Reconnaissance Hmmm, what can I get about you?!! Client Server

  4. Client Reconnaissance • Browser identification – https://panopticlick.eff.org/ • AV related info – AV fingerprinting – Up-to-date? • Timing channels – AV performance tradeoff – Make the common case fast – Updated?

  5. Threat Model Measure scanning time Updated?? Client Server

  6. Basic Idea • Antivirus (AV) scans data against sigs • Sigs are stored somehow in AV’s data structures • Scanning time – Based on scanning path • Hitting the newly added sigs

  7. ClamAV • ClamAV – http://www.clamav.net – http://www.clamxav.com/ – http://www.clamwin.com/ • Scanning steps: – File type filtering – Filtering step – Boyer-Moore algorithm – Aho-Corasick algorithm

  8. File Type Filtering File to scan Type Roots File Type Filtering Type

  9. Filtering Step Input Yes/No Filter

  10. Boyer-Moore Sig Array of LLs chars HASH Sig

  11. Aho-Corasick

  12. Methodology • Question #1 : Is there a timing channel in the way ClamAV scans data? • Question #2 : If the first question is confirmed, how could the attacker create the timing channel?

  13. Methodology/Q1 • Collect viruses in (name,date) pairs and remove their sigs from current DB

  14. Two Kinds of Experiments • Whole-day sig experiment • Single sig experiment

  15. Whole-Day Sigs of DateX Becomes DB before DateX DB after DateX Old New Scan

  16. content BuffSize = 256 KB ( ( (ahochars|boyerchars)^n . filterchars)^m) File Size

  17. Single Signature One Sig Becomes DB before SigX DB after SigX Old New Scan

  18. Whole-Day Frequency Time Difference (seconds) )

  19. Single Frequency Time Difference (seconds) )

  20. Methodology/Q2

  21. Methodology/Q2 Time Start CPU Time Determine CPU Create file Close the file Busy Time Sampling

  22. Scanning Time (seconds) Min ActiveX Max

  23. Possible Timing Channels in Modern AVs • Pattern matching • Algorithmic scanning – Zmist virus needs to execute at least 2 million p- code-based iterations • Code emulation – Significantly slows scanning • Heuristics – Extra work when triggered

  24. Related Work • Network discovery – Port scanning • Timing channel attacks – Secret keys in cryptographic systems – Virtual machines detection – Others • Antivirus research – Signature extraction – Detection evasion

  25. Conclusion and Future Work • Application-level reconnaissance through timing channels • Running example: ClamAV • Currently, we are exploring performance issues in commercial antiviruses

  26. Acknowledgements • Török Edwin • LEET reviewers • U.S. National Science Foundation (CNS- 0905177)

  27. Thanks

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend