RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking
- Y. Ji, S. Lee, E. Downing, et.al.
RAIN: Refinable Attack Investigation with On-demand Inter-Process - - PowerPoint PPT Presentation
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking Y. Ji, S. Lee, E. Downing, et.al. CCS17 Presented by: Mohammad A. Noureddine CS563 Fall 2018 No Shortage of Recent Breaches! 1 Investigating
1
2 1 Bates, Adam M., et al. "Trustworthy Whole-System Provenance for the Linux Kernel." USENIX Security Symposium. 2015.
3
4
read read read read write
5
6
Good Runtime Performance Reduce performance hit of DIFT Improved granularity!
7
8
9
10
11
12
13
14
Bad socket D P2
read
B
write
P1
read
C P3 E F A
send read write mmap read
15
Bad File D P2
read
B
write
P1
read
C P3 E F A
send read write mmap read
16
Bad File D P2
read
B
write
P1
read
C P3 E F A
send read write mmap read
17
P2 D P2
read
B
write
P1
read
C P3 E F A
send read write mmap read read write
No memory interference
18
P2 B
write
P1
read
C P3 E F A
send read write mmap read write write write
19
Intel PIN tools P1 P2 a.txt b.txt
Fine-grained causality
20
21
D P2
read
B
write
P1
read
C P3 E F A
send read write mmap read
Interference points. Run taint analysis Does not influence A. Drop this path! Continue down this path Interference points. Run taint analysis Does not influence C. Drop this path! True causality
22
Bad File D P2
read
B
write
P1
read
C P3 E F A
send read write mmap read
23
RAIN module Arnold Runtime Collection Provenance Graphs Record & Replay Logs Replay Engine Selective DIFT Fine-grained graphs
24
25
26
27 1 Devecsery, David, et al. "Eidetic Systems." OSDI. Vol. 14. 2014.