Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software
Mohammed I. Al-Saleh and Jedidiah R. Crandall
Application-Level Reconnaissance: Timing Channel Attacks Against - - PowerPoint PPT Presentation
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software Mohammed I. Al-Saleh and Jedidiah R. Crandall Server Reconnaissance OS & Services ports Client Server Client Reconnaissance Hmmm, what can I get about
Mohammed I. Al-Saleh and Jedidiah R. Crandall
ports OS & Services
Client Server
Hmmm, what can I get about you?!! Client Server
– https://panopticlick.eff.org/
– AV fingerprinting – Up-to-date?
– AV performance tradeoff – Make the common case fast – Updated?
Measure scanning time Updated?? Client Server
– Based on scanning path
– http://www.clamav.net – http://www.clamxav.com/ – http://www.clamwin.com/
– File type filtering – Filtering step – Boyer-Moore algorithm – Aho-Corasick algorithm
File Type Filtering File to scan Type Roots Type
Input Filter Yes/No
Sig
chars HASH Sig Array of LLs
DB before DateX DB after DateX Sigs of DateX Scan Becomes Old New
( ( (ahochars|boyerchars)^n . filterchars)^m) File Size BuffSize = 256 KB
DB before SigX DB after SigX One Sig Scan Becomes
Old New
Time Difference (seconds)) Frequency
Time Difference (seconds)) Frequency
Create file Close the file Time Start CPU Time Sampling Determine CPU Busy Time
Max Min Scanning Time (seconds)
– Zmist virus needs to execute at least 2 million p- code-based iterations
– Significantly slows scanning
– Extra work when triggered
– Port scanning
– Secret keys in cryptographic systems – Virtual machines detection – Others
– Signature extraction – Detection evasion